期刊文献+

基于网络的入侵检测系统数据包采样策略研究 被引量:3

An Analysis of Packet Sampling Strategy of Network-based Intrusion Detection System
下载PDF
导出
摘要 基于网络的入侵检测系统中,由于检测速率与数据包采集速率不匹配,以及检测所需成本的限制,在收集用于检测的网络数据包时,必须选择有效的采样策略.本文引入博弈模型框架上的原始入侵数据包采样策略,在此基础上再进行分析和扩展.针对单一采样策略的缺陷与不足,引入风险管理的思想来分析在决策者不同效用偏好情况下的采样策略选择问题,并且通过具体的实例,说明了基于风险差异的采样策略选择的有效性. Since sampling entails incurring network costs hardware in the network-based intrusion detection system, strategy to effectively detect network intrusions without for real-time packet sampling and packet examination we would like to develop a network packet sampling exceeding the velocity of the packet examination. We consider this problem in a game theoretic framework and introduce sampling schemes that are optimal in this game theoretic setting by the Minimax theorem and the max-flow rain-cut theorem. According to the limitation and scarcity of this single intrusion node method, we introduce a method of risk management and extend the solution to more complex cases to choose sampling strategy while facing more various environments. Finally, we provide an empirical study to exemplify our improved method.
出处 《中国科学院研究生院学报》 CAS CSCD 2006年第4期534-542,共9页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家863计划项目(2003AA103710)资助
关键词 入侵检测 采样策略 博弈理论方法 风险管理 intrusion detection, sampling strategy, game theoretic approach, risk management
  • 相关文献

参考文献7

二级参考文献33

共引文献127

同被引文献25

  • 1杨建华,谢高岗,李忠诚.一种业务流自适应尽力采样方法[J].计算机研究与发展,2006,43(3):402-409. 被引量:4
  • 2DUFFIELD N. A Framework for Packet Selection and Reporting, Internet Draft [ S]. IETF Packet Sampling Working Group, January 2005.
  • 3ZSEBY T, MOLINA M, DUFFIELD N, et al. Sampling and Filtering Techniques for IP Packet Selection, Internet Draft [ S]. IETF Packet Sampling Working Group, July 2005.
  • 4GOLDREICI-I O. Foundations of Cryptography [ M ]. Cambridge University Press, 2007.
  • 5Fang Yu, Katz R H, Lakshman T V.A multi-gigabit rate deep packet inspection algorithm using TCAM[C]//ICNP 2004,2004.
  • 6Fatahalian K, Houston M.A closer look at GPUs[J].Communica- tions of the ACM,2008,S1:50-57.
  • 7Owens K D,Luebke D,(3ovindaraju N,et al.A survey of gener- al-purpose computation on graphics hardware[J].Computer Graph- ics Forum.2007.26: 80-113.
  • 8Aho A' V, Corasick M J.Efficicnt string matching: an aid to bib- liographic seaxch[J].Communications of the ACM, 1975, 18 (6) : 333-340.
  • 9Receive-side scaling enhancements in Windows server[EB/OL]. ( 2008 ) .http://www.microsoft.com/whdc/device/network/ndis rss. mspx.
  • 10Torrellas J,Lam H S, Hennessy J L.False sharing and spatial lo- cality in mulfiprocessor caches[~,IEEE Trans on Computers, 1994, 43(6) :651-663.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部