期刊文献+

入侵检测系统通用模型的分析与研究

Analysis and Research on Common Model of Intrusion Detection System
下载PDF
导出
摘要 入侵检测是信息安全保障的关键技术之一。本文简要介绍了入侵检测系统的概况和目前入侵检测系统中采用的两种通用模型:通用入侵检测框架(CIDF)和入侵检测信息交互格式(IDMEF),并在技术上对两者的优势与不足做了分析和比较。 Intrusion detection is one of the critical techniques in information assurance. This paper introduces the general situation of the Intrusion Detection System and two kinds of common model used in Intrusion Detection System. They are Common Intrusion Detection Framework (CIDF) and Intrusion Detection Message Exchange Format (IDMEF), and their advantages and disadvantages are analyzed and compared in technology.
出处 《现代计算机》 2006年第3期86-89,共4页 Modern Computer
关键词 网络安全 入侵检测 CIDF IDMEF 标准化 Network Security Intrusion Detection CIDF IDMEF Standardization
  • 相关文献

参考文献3

二级参考文献50

  • 13505Pon1-yyou.基于网络和主机的入侵检测比较[EB/OL].http://o1dsite. 1inuxaid. com. cn/so1ution/showso1.jsp=280,2002-05-23.
  • 2LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 3LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 4KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 5LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 6An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 7ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 8The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 9KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 10Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.

共引文献232

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部