期刊文献+

NIDS警报分析系统模型设计与分析

Design and analysis of the model of the alarms analysis system in NIDS
下载PDF
导出
摘要 网络入侵检测系统(N IDS)是一种检测网络入侵行为的工具,但在实际应用中,警报量多、误警率高,已经严重制约了N IDS的发展。文章分析了其产生的原因,提出了一种基于异常检测技术的N IDS警报分析系统模型;重点讨论了数据挖掘技术在该模型中的应用。 Nowadays many network intrusion detection systems (NIDSs) employ the misuse detection technology or the anomaly detection technology to detect network data streams and alarm attack attempts. In reality, too many alarms and the high false positive rate have already restricted the development of NIDSs. The causes are analyzed in this paper,and to solve the problems,a model based on anomaly detection is presented for analyzing the alarms in NIDSs. The application of database mining technology to extract the behavior of normal alarms of NIDSs is discussed in detail.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第11期1377-1380,共4页 Journal of Hefei University of Technology:Natural Science
关键词 网络入侵检测系统 误警率 数据挖掘 异常检测 入侵警报 network intrusion detection system(NIDS) false positive rate data mining anomaly detection intrusion alarm
  • 相关文献

参考文献7

  • 1Ptack T H, New Sham T N. Insertion,evasion and denial of service: Encluding network intrusion detection[EB/OL]. http://secinf. net/info/ids/idspaper/idspaper.html,2002-10-16.
  • 2Roesch M,Green C. Snort users manual[EB/OL]. http://www.snort.org, 2003-04-18.
  • 3李雪莹,刘宝旭,毕学尧,安德海,许榕生.对入侵检测警报关联分析的研究与实践[J].计算机工程与应用,2003,39(19):14-16. 被引量:12
  • 4Manganaris S,Christensen M,Zerkle D,et al.A data mining analysis of RTID alarms[J].Computer Networks,2000,34:571-577.
  • 5HanJw KambrM.数据挖掘-概念与技术(影印版)[M].北京:高等教育出版社,2001.20-150.
  • 6Denning D E. An intrusion-detection model[J].IEEE Transactions on Software Engineering,1987,13(2):222-232.
  • 7蒋嶷川 田盛丰.在IDS中利用数据挖掘技术提取用户行为特征[EB/OL].http://enki.jxlib.com/Grid20/,2004-11-10.

二级参考文献4

  • 1F Cuppens,A Mi'ege.Alert Correlation in a Cooperative Intrusion Detection Framework[C].In:IEEE Symposium on Security and Privacy, Oakland, USA, 2002.
  • 2D Curry,H Debar.Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language(XML)Document Type Definition.draft-itetfidwg- idmef-xml-03.txt, 2001-02.
  • 3T Tidwell,R Larson,K Fitch et al.Modeling Internet Attacks[C].In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy,West Point,NY,2001-06.
  • 4Fr'ed'eric Cuppens, Fabien Autrel,Alexandre Miege et al.Correlation in an intrusion detection process.S' Ecurit des Communications sur Internet-SECI02,2002-09.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部