期刊文献+

基于有限状态机协议分析模型的入侵检测系统 被引量:3

The Intrusion Detection Systems Based on the Finite Automat Model
下载PDF
导出
摘要 基于状态协议分析的入侵检测方法利用网络协议提供的状态信息,把网络攻击过程转化为协议状态迁移,能有效地检测DOS/DDOS等较难检测的攻击。本文对协议分析入侵检测的方法和算法进行了研究,并通过对网络协议和入侵攻击的深入分析,提出了一个基于有穷状态机的状态协议迁移模型。在给出检测算法的形式化描述的基础上根据Snort规则语法扩展实现实验系统,并测试验证了其有效性。 The intrusion detection approach coverts the network attack to aprotocol state transfer by the state information of network protocol. Some attacks which is difficult to detecte, such as distribute denial of server attacks, can be effectively detected. The paper discusses the technique and algorithms of intrusion detection based on the protocol analysis, and presents a protocol state transfer model according finite automata. The experimental system is implemented mith the expending Snort rules.
作者 邓文达
出处 《自动化技术与应用》 2006年第6期48-50,82,共4页 Techniques of Automation and Applications
基金 国家自然科学基金资助(60173041) 湖南省自然科学基金资助(02JJY2094)
关键词 入侵检测系统 状态协议分析 有穷状态机 SNORT intrusion detection system STAteful protocol analysis finite automat snort
  • 相关文献

参考文献4

二级参考文献24

  • 1T Tidwell,R Larson,K Fitch et al.Modeling Internet Attacks[C].In:Proceedings of the 2001 IEEE Workshop on Information Assurance and Security,2001:54~59
  • 2Michael Spibey J.The Z notation:a reference manual[M].2nd edition,Prentice Hall,1992
  • 3Reduce,Grosse,G Smith.Object-Z:a specification language advocated for the description of standards[S].Computer Standards and Interfaces,1995:511~533
  • 4[1]L.T. Heberlein,G. V. Dial, etc, A network security monitor. [C]In Proceedings of the IEEE Symosium on Research in Security and Privacy,Okaland, CA, May 1990 296~304
  • 5[2]S.R. Snapp, etc,DIDS(Distributed Intrusion Detection System) -motivation, architecture, and an early prototype, [C]In Proceedings of the 14th National Computer Security Conference, Washington, DC, October 1991
  • 6[3]S. Cheung, etc, The Design of GrIDS: a graph-based intrusion detection system. [R] Technical Report CSE-99-2, U.C. Davis Computer Science Department, January 1999
  • 7[4]P.A. Porras and P. G. Neumann. EMERALD: event monitoring enabling responses to anomalous live disturbance. [C] In Proceedings of the 1997 National Information System Security Conference, October 1997
  • 8[5]CISCO, Netranger: intrusion detection system. [J] Technical Information, April 1999
  • 9[6]Internet Security System. [J] Introduction to Realsecure Version 3.0, January 1999
  • 10[7]R.A. Kemmerer. NSTATA: a model-based real-time network intrusion detection system. [R]Technical Report TRCS-97-18, Department of Computer Science, UC Santa Barbara, November1997

共引文献14

同被引文献43

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部