期刊文献+

分布式入侵检测系统研究综述 被引量:7

A Survey on Distributed Intrusion Detection System
下载PDF
导出
摘要 介绍了入侵检测的发展概况,指出了传统入侵检测系统的不足,给出并分析了几种典型的分布式入侵检测系统模型。最后,讨论了当前分布式入侵检测系统中存在的问题并展望了未来的发展方向。 An introduction of the development state of intrusion detection is given, disadvantages of traditional intrusion detection systems are pointed out. Also several typical distributed intrusion detection modals are presented and analyzed. Finally, the shortcomings of current intrusion detection systems are discussed and a number of future researches in this field are suggested.
出处 《微电子学与计算机》 CSCD 北大核心 2006年第9期191-192,196,共3页 Microelectronics & Computer
基金 国家自然科学基金项目(60172043)
关键词 入侵检测系统 分布式系统 AGENT Intrusion detection system, Distributed system, Agent
  • 相关文献

参考文献4

  • 1Spafford EH.Intrusion detection using autonomous agents[J].Computer Networks,2000,3(4):547~570
  • 2Spafford EH.Intrusion detection using autonomous agents[J].Computer Networks,2000,3(4):547~570
  • 3卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 4B Mukherjee,L T,Heberlein Levitt.Network Intrusion Detection[J].IEEE Network,2004,8 (3):26~41

二级参考文献46

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献231

同被引文献26

引证文献7

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部