期刊文献+

入侵检测研究综述 被引量:19

Survey on Intrusion Detection Techniques
下载PDF
导出
摘要 入侵检测是动态安全技术中最核心的技术之一。从体系结构的演变、检测方法分析和系统测评工作三个方面对当前入侵检测的研究进行技术性综述,讨论了现有的入侵检测体系结构,详细分析了各种入侵检测方法,对现有的入侵检测评估工作进行了总结,指出了当前入侵检测研究中存在的问题和今后发展的趋势。 Intrusion detection, as one of the most active and important network security technology, can compensate the shortcomings of traditional security protection measure. Through building dynamic security cycle, it can promote the protection capacity of system and reduce the security threats as great as possible. An overview of basic issues on intrusion detection is shown in this paper, which is involved with three main aspects of intrusion detection, including Intrusion Detection System (IDS) architecture, intrusion detection methods and IDS evaluation. Firstly, three kinds of IDS architectures are analyzed. Then, current intrusion detection models are given, and their merits or shortcomings are discussed in detail. Finally, some future promising directions are presented.
出处 《计算机应用研究》 CSCD 北大核心 2005年第12期11-14,共4页 Application Research of Computers
基金 上海科技发展基金资助项目(045115006)
关键词 入侵检测 网络安全 Intrusion Detection Network Security
  • 相关文献

参考文献20

二级参考文献102

  • 1Forrest S., Hofmeyr S.A., Somayaji A., Longstaff T.A.. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1996, 120~128
  • 2Lee Wenke, Xiang Dong. Information-theoretic measures for anomaly detection. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2001, 130~143
  • 3Lane T., Brodley C.E.. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the 5th ACM Conference on Computer & Communication Security, San Francisco, California, USA, 1998, 295~331
  • 4Goldman R.P., Geib C.W., Miller C.A.. A new model of plan recognition. In: Proceedings of the 1999 Conference on Uncertainty in Artificial Intelligence, Stockholm, Sweden, 1999, 245~254
  • 5Charniak E., Goldman R.. A Bayesian model of plan recognition. Artificial Intelligence, Elsevier Science Publishers. 1993, 64(1): 53~79
  • 6Albrecht R., Zukerman R., Nicholson A., Bud A.. Towards a Bayesian model for keyhole plan recognition in large domains. In: Proceedings of the 6th International Conference on User Modeling. Sardinia, Italy, 1997, 365~376
  • 7Wrn A., Stenborg O.. Recognizing the plans of a replanning user. In: Proceedings of the IJCAI95 Workshop on The Next Generation of Plan Recognition Systems: Challenges for and Insight from Related Areas of AI. Montreal, Canada, 1995, 113~118
  • 8Nicholson A.E., Brady J.M.. Dynamic belief networks for discrete monitoring. IEEE Transactions on Systems, Man, and Cybernetics, 1994, 24(11): 1593~1610
  • 9Tawfik A.Y., Neufeld E.. Temporal Bayesian networks. In: Proceedings of the 1st International Workshop on Temporal Representation and Reasoning (TIME), Pensacola, Florida, USA, 1994, 85~92
  • 10Geib C.W., Goldman R.P.. Plan recognition in intrusion detection systems. In: Proceedings of DARPA Information Survivability Conference and Exposition(DISCEX), Anaheim, California, USA, 2001, 1: 46~55

共引文献325

同被引文献125

引证文献19

二级引证文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部