期刊文献+

入侵检测技术及其发展趋势 被引量:9

Intrusion detection technology and its future trend
下载PDF
导出
摘要 入侵检测是一个主动的和重要的网络安全研究领域,首先介绍了入侵检测系统的发展过程;阐述了入侵检测系统的功能、通用模型及分类,并重点分析了入侵检测系统的各种入侵检测技术;最后指出了目前入侵检测系统面临的主要挑战,并提出了入侵检测技术的未来发展趋势。 Intrusion detection is an active and important research field of network security. This paper introduces the develgpment process of intrusion detection system and illustrates the function, common model and classification of intrusion detection system. The analysis of intrusion detection techniques is emphasized. Finally, some main challenges faced by current intrusion detection technology and future promising directions of IDS are presented.
作者 姚君兰
出处 《信息技术》 2006年第4期172-175,共4页 Information Technology
关键词 入侵检测 入侵检测系统 入侵检测技术 intrusion detection IDS intrusion detection technology
  • 相关文献

参考文献7

  • 1Anderson J P.Computer Security Threat Monitoring and Surveillance[R].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania,1980.
  • 2Denning D E.An intrusion-detection model[J].IEEE Trans.on Software Engineering,1987,SE-13(2):222-232.
  • 3张然,钱德沛,张文杰,刘轶,栾钟治.入侵检测技术研究综述[J].小型微型计算机系统,2003,24(7):1113-1118. 被引量:47
  • 4Wenke Lee.A Data Mining Framework for Building Intrusion Models[C].In IEEE Symposium on Security and Privacy,1999:120-132.
  • 5Forrest S,Hofmeyr S A.Computer immunology[J].Communications of the ACM,1997,40(10):88-96.
  • 6Steven Andrew Hofmeyr.An Immunological Model of Distributed Detection and Its Application to Computer Security[D].Ph.D.dissertation of University of New Mexico,USA,1999.
  • 7Spafford E H.Intrusion Detection Using Autonomous Agents[J].Computer networks,1999.

二级参考文献11

  • 1Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 2Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232.
  • 3Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990.
  • 4Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997.
  • 5Cannady J. Artifical neural network for misuse detection [C]. In Proceeding of the 1988 National Information Aystem Security Conference (NI-SSC' 98), 1998, 10: 5-- 8): 443-456.
  • 6Ludovic Me. Gassata. A genetic algorithm as an alternative tool for security audit trail analysis [R]. Cesson Sevigne Cedex,France: Superlec, 1996.
  • 7Crosbie M, Spafford G. Applying genetic programming to intrusion detection [R]. Purdus University : Department Computer Sciences, Coast Laboratory, 1997.
  • 8Steven A H. An immunological model of distributed detection and its application to computer security[D]. [s. 1. ] : University of New Mexico, 1999.
  • 9Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez,David Isacoff, Eugene Spafford, Diego Zamboni. An architecture for intrusion detection using autonomous agents [R]. CERIAS Technical Report 98/05, June 11,1998.
  • 10Forrest S, Hofmeyr S A ,and Somayaji A. Computer immunology[J]. Communications of the ACM,1997,40(10) :88-96.

共引文献46

同被引文献143

引证文献9

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部