期刊文献+

入侵检测系统攻击描述语言研究与分析 被引量:1

Study and Analysis on Attack Description Language of Intrusion Detection System
下载PDF
导出
摘要 为了更好的利用攻击描述语言描述网络攻击行为并设计出一种较为完善的语言,对几种比较典型的语言进行了研究,分析了它们各自的设计特点,并通过一个具体的网络攻击实例进行对比分析,从中分析其优缺点,最后总结了完善的描述语言应该具备的特点和功能,讨论了描述语言的发展过程和方向。 In order to describe network attack better in attack description language and design a more perfect language, several typical description languages are studied and design features of each language are analyzed. After comparison and contrast of an example of network attack, the feature and function of a perfect description language is summarized. At last, the development process and the trend of the perfect description language is discussed.
出处 《信息与电子工程》 2005年第1期72-76,共5页 information and electronic engineering
基金 国家自然科学基金(60372039)
关键词 计算机系统结构 描述语言 综述 网络攻击 漏洞 入侵检测系统 computer architecture: description language: survey: network attack: vulnerability: Intrusion Detection System
  • 相关文献

参考文献10

  • 1Dorothy E Denning. An Intrusion Detection Model[J]. IEEE Transactions on Software Engineering, 1987,2(13):222-232.
  • 2Steven T Eckmann, Giovanni Vigna, Richard A. Kemmerer. STATL:An Attack Language for State-based Intrusion Detection[EB/OL].http://www. cs.ucsb.edu/~vigna/pub/2000_eckmann_vigna_kemmerer_statl.pdf,2000.
  • 3Cedric Michel, Ludovic Me. Adele: An Attack Description Language for Knowledge-based Intrusion Detection[EB/OL]. http://www.rennes. supelec.fr/ren/perso/cmichel/MM01.ps,2001.
  • 4R Deraison. The Nessus Attack Scripting Language Reference Guide[EB/OL]. http://www. nessus.org/doc/nasl.html,2000.
  • 5Giovanni Vigna, Steven Eckmann, Richard Kennerer. Attack Languages[EB/OL].http://www. cs.ucsb.edu/~rsg/pub/2000_vigna _eckmann_kemmerer_attacklanguages.ps.gz,2000.
  • 6Microsoft Security Bulletin of MS04-011 [EB/OL]. http://www. microsoft.com/technet/security/bulletin/ms04-011.mspx,2004.
  • 7Tenable Network Security. Microsoft Hotfix for KB835732 (SMB check)[EB/OL].http://cvsweb.nessus.org/cgi-bin/cvsweb.cgi/nessus-plugins/scripts/smb_kb835732.nasl,2004.
  • 8Martin Roesch, Chris Green. Snort Users Manual[EB/OL]. http://www. snort. org/docs/writing_rules,2001.
  • 9Secure Networks. Custom Attack Simulation Language (CASL) [EB/OL]. http://www.sockpuppet. org/tqbf/casl.html, 1998.1.
  • 10F Cuppens, R Ortalo. Lambda: A language to model a database for detection of attacks[EB/OL]. http://www. rennes.enst-bretagne.fr/~fcuppen s/articles/raid2000.ps,2000.

同被引文献6

  • 1Dorothy E Denning.An intrusion-detection model[J].IEEE Transactions on Software Engineering,1987,SE213 (2):222-232.
  • 2Giovanni Vigna,Steven Eckmann,Richard Kennerer.Attack Languages[EB/OL].http://www.cs.ucsb.edu/~rsg/pub/2000_vigna_eckmann_kemmerer_attacklanguages.ps.gz,2000-01-31.
  • 3Steven T Eckmann,Giovanni Vigna,Richard A Kemmerer.STATL:An Attack Language for State-based Intrusion Detection[EB/OL].http://www.cs.ucsb.edu/~vigna/pub/2000_eckmann_vigna_kemmerer_statl.pdf,2000-11-30.
  • 4Cedric Michel,Ludovic Me.Adele:An attack description language for knowledge-based intrusion detection[A].Proc of the 16th Int'l Conf on Information Security.Dordrecht[C].Holland:Kluwer,2001.353-368.
  • 5Vern Paxson,Jim Rothfuss,Brian Tierney.BRO Quick Start Guide[DB/OL].http://bro-ids.org/Bro-quick-start.pdf,version 0.9,2004-11-15.
  • 6The Snort Project.SnortTMUsers Manual 2.6.0[DB/OL].http://www.snort.org/docs/snort_manual/2.6/snort_manual.pdf,2006-05-23.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部