期刊文献+

一种基于协议分析的入侵检测系统

An Intrusion Detection System Based on Protocol Analysis
下载PDF
导出
摘要 针对目前出现的利用协议漏洞进行攻击的入侵方式,提出了一种基于协议分析的入侵检测系统模型.该模型采用简单协议分析与协议状态分析检测技术,使用了散列数高速匹配算法,可以实现该类检测的全面性、准确性与高效性. Attacks on protocol become serious in network intrusion. Using the intrusion detection methods based on protocol analysis, a model of intrusion detection system is designed and developed. Methods of simple protocol analysis and protocol state analysis are used, and the improved high-speed algorithm of pattern matching is also used in this model, which enhance the completeness, accuracy and efficiency of detection.
出处 《中南民族大学学报(自然科学版)》 CAS 2005年第3期60-63,共4页 Journal of South-Central University for Nationalities:Natural Science Edition
基金 国家863计划资助项目(网络安全协议研究) 中南民族大学青年科研基金(YZQ01002)
关键词 协议分析 入侵检测 模式匹配 protocol analysis intrusion detection pattern matching
  • 相关文献

参考文献8

  • 1涂保东.入侵检测系统的发展历史[J].计算机安全,2003(31):18-21. 被引量:4
  • 2严文涛,张明,徐伟华.识别IDS躲避技术-网络安全策略的关键[J].山东电子,2003(1):21-23. 被引量:2
  • 3唐屹.CIDF框架上的入侵检测规则扩充[J].计算机应用,2002,22(11):43-46. 被引量:3
  • 4Ilgun K,Kemmerer R A, Porras P A. State transition analysis: a rule-based intrusion detection approach[J]. Software Engineering IEEE Transactions ,1995, 21(3):181~199
  • 5Kunth D E,Morris(Jr) J H,Pratt VR. Fast pattern matching in strings[J]. SIAM Journal on Computing,1977,6(1):323~350
  • 6Boyers R S,Moore J S. A fast string searching algorithm[J]. Communications of the ACM, 1977,20:762~772
  • 7Horspool R N. Practical fast searching in strings[J]. Software Practice & Experience, 1980,10(6):501~506
  • 8Sunday D M. A very fast substring search algorithm[J]. Communications of the ACM,1990,33(8):132~142

二级参考文献15

  • 1Kahn C.,Porras P.,Staniford-Chen S.,et al.A Common Intrusion Detection Framework[EB/OL].http://www.GIDOs.org /draft/cidf-jcs.pdf,2001-06.
  • 2Feiertag R.,Kahn C.,Porras P.,et al.A Common IntrusionSpecification Language (CISL)[EB/OL].http://www.GIDOs.org/drafts/language.txt,2001-06.
  • 3Mounji A.Rule-Based Distributed Intrusion Detection[D].Institut d′Informatique,University of Namur,Namur,Belgium,July 1997.
  • 4Staniford-Chen S.,et al.GrIDS a Graph Based Intrusion Detection System for Large Networks[A].Proceedings of the 19th National Information Systems Security Conference[C],September 1996.
  • 5http://www.snort.org[EB/OL],2001-02.
  • 6Ruiu D.Cautionary Tales: Stealth Coordinated Attack HOWTO[EB/OL].http://www.dursec.com/articles,2001-02.
  • 7Howard J.D.An Analysis of Security Incidents on the Internet[D].Carnegie Mellon University,August 1998.
  • 8Barrus J.,Rowe N.C.A Distributed Autonomous-Agent Network-Intrusion Detection and Response System[A].Proceedings of the 1998 Command and Control Research and Technology Symposium[C].Monterey,CA,June 1998.
  • 9Kumar S.Classification and Detection of Computer Intrusions[D].Department of Computer Science,Purdue University,August 1995.
  • 10Kenney J.Executable Formal Models of Distributed Transacton Systems Based on Event Processing[D].Department of Electrical Engineering,Stanford University,June 1996.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部