期刊文献+

基于日志的网络背景流量模拟仿真 被引量:3

Network Background Traffic Simulation Based on Log
下载PDF
导出
摘要 入侵检测系统(IDS)的开发与评估需要一个仿真的网络环境,网络流量模拟仿真技术是其中关键技术之一.在详细分析了网络流量的模拟仿真技术及其相关软件基础上,设计并实现了一种基于日志的网络背景流量模拟仿真软件,解决了入侵检测系统测试中的攻击类型定义和背景流量问题,并使用该软件模拟真实的网络环境对入侵检测系统进行测试分析.实验结果表明,基于日志的网络背景流量仿真软件能够在日志信息的基础上以不同速度动态回放网络流量仿真数据,并能够对日志数据进行修改,增加了对入侵检测系统测试的灵活性. A simulation network environment is required for the development and evaluation of IDS (Intrusion Detection System), and network traffic simulation is the key technique in testing IDS, To work out the definition of attack type and background traffic in testing IDS, new network background traffic simulation software based on log is designed and developed referred to related technique and software in detail, Real network environment is simulated by this software to test YDS. The experimental results imply this simulation software is able to playback network traffic simulation data dynamically with various rates based on log and modify log data. This method improves the flexibility of testing IDS.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第2期197-201,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(90204014)资助 吉林省自然科学基金项目(20030516-1)资助
关键词 入侵检测 网络流量 模拟仿真 日志 intrusion detection network traffic simulation Log
  • 相关文献

参考文献10

  • 1Briny,Andy & Rose.Barbara study confirms increased security risks of E-Commerce[EB/OL].http://www.icsa.net/news/press_room/1999-/mag_survey.shtml》,2003,5.
  • 2Hu Liang,Kang Jian,Zhao Kuo,et al.Intrusion detection systems[J].Journal of Jilin University Information Science Edition,2002,20 (4):46-47.
  • 3Puketza,Nicholas J,et al.(University of California,Davis).A methodology for testing intrusion detection systems[J].IEEE Transactions on Software Engineering,1996,22 (10):719-722.
  • 4Debar H,et al.An experimentation workbench for intrusion detection systems[R].Zurich,Switzerland:IBM Research Division,Tech Rep:RZ2998,1998.
  • 5pcap-Packet Capture library[EB/OL].http://www.packetfactory.net/libpcap,2003,5.
  • 6Peter Wang.Libnet-HOWTO[EB/OL].http://www.canvaslink.com/libnet/,2003,8.
  • 7Zhang Yao-jiang,Focus on attacking methods and protection strategies of hackers[M].Beijing:People Post and Communication Publish,2002.
  • 8Zhang Wei,(Linux network programming)[M].Beijing:Beijing Hope Publish,2002.
  • 9Tim Carstens.Programming with pcap[EB/OL].http://www.tcpdump.org/pcap.htm,2003,8.
  • 10Schiffman,Michael D.Libnet 101,Part1:The Primer[EB/OL].http://www.guardent.com/docs/libnet_wp.PDF,2003,9.

同被引文献7

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部