期刊文献+

入侵检测语言的评估

Evaluation Method for Intrusion Detection Language
下载PDF
导出
摘要 入侵检测语言是入侵检测系统用于定义攻击场景的表示规范.提出一种比较和评估入侵检测语言的方法,该方法建立在一个可被证明是互斥和完备的分类基础上,并基于表达能力、表示简洁性、检测强度等三个测度.使用该方法可以对现有的各类检测语言表示攻击特征并进行推理的相对有效性进行评估,从而揭示出现有检测语言的缺陷和理想的入侵检测语言应具有的特性. Intrusion detection language is an expression specification used by IDS to describe the intrusion senarios. Based on a mutually exclusive and exhaustive taxonomy of network attacks and their detection languages, this paper proposes an evaluation method for intrusion detection languages with three metrics:expressibility,representational succinctness and detection intensity. Those well-known detection languages have been evaluated using this method in terms of their ability to express attack signature and their detection efficiencies, so as to reveal their shortages and the features that an ideal detection language should have.
作者 孙美凤 龚俭
出处 《小型微型计算机系统》 CSCD 北大核心 2005年第11期1913-1918,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金(90104031)资助
关键词 入侵检测系统 检测语言 检测算法 评估 intrusion detection system detection language detection algorithm evaluation
  • 相关文献

参考文献16

  • 1ebra Anderson, Thane Frivold, Alfonso Valdes . Next-generation intrusion detection expert system (NIDES) a summary[EB/OL]. SRI-CSL-95-07, 1995. http://www.sdl.sri.com/nides/reports/4sri.pdf.
  • 2Porras A,Neumann P G. EMERALD: event monitoring enabling responses to anomalous live disturbances[C]. In : Proceedings of the 20th National Information Systems Security Conference. Baltimore, Maryland,USA, 1997. 353-365. http://www.sdl.sri.com/emerald/emerald-niss97.html.
  • 3Ilgun K. USTAT: a real-time intrusion detection system for UNIX[D]. Computer Science Dept., University of California, Santa Barbara, USA, 1992.
  • 4Vigna G, Kemmerer R A. NetSTAT: a network-based intrusion detection system[J]. Journal of Computer Security, 1999,7(1): 37-71.
  • 5Kumar S. Classification and detection of computer intrusions[D]. Dept. of Computer Science, Purdue University, USA, 1995.
  • 6Habra, B.Le Charlier, A. Mounji, and I. Mathieu. ASAX: software architecture and rule-based language for universal audit trail analysis[C]. In : Proc of (ESORRICS)'92. Springer-Verlag, 1992:435-450.
  • 7Paxson V. Bro: a system for detecting network intruders in real-time[J]. Computer Networks, 1999,31(23-24):2435-2463.
  • 8Roesch M.Snort-lightweight intrusion detection for networks[C]. In: Proceedings of USENIX LISA'99 Conference,1999: 229-238.
  • 9J.-L.Lin and X.Sean Wang amd S.Jajodia. Abstraction-based misuse detection: high-level specifications and adaptable strategies[C]. In: Proc. of the 11th Computer Security Foundations Workshop, Rockport, MA, 1998:190-201.
  • 10Michel C,Me L.Adele: an attack description language for knowledge-based intrusion detection[C]. In: Proc. of the 16th International Conference on Information Security,2001. http://citeseer.nj.nec.com/michel01adele.html.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部