期刊文献+

网络态势感知系统研究综述 被引量:123

Survey of Network Situation Awareness System
下载PDF
导出
摘要 开展网络态势感知系统NSAS(NetworkSituationAwarenessSystem,也称CyberspaceSituationAwarenessSystem)的研究,对于提高我国网络系统的应急响应能力,缓解网络攻击所造成的危害,发现潜在恶意的入侵行为,提高系统的反击能力等具有十分重要的意义。本文首先给出了态势感知的概念及发展NSAS的必要性;其次介绍了网络态势感知的概念,并对相关概念以及NSAS与IDS(IntrusionDetectionSystem)的区别与联系进行了讨论,详细综述了国内外NSAS的研究现状。以此为基础提出了NSAS的框架,并着重对相关的关键技术与难点问题进行了论述。最后给出了NSAS今后的发展方向。 The study of NSAS(Network Situation Awareness System or Cyberspace Situation Awareness System)has great importance in improving abilities of responding to emergences, reducing losses of network attacks, revealing abnormally intrusions and enhancing system abilities of fighting back. At first, the definition of situation awareness and the necessity of developing NSAS were given. Then, the definition of NSAS was presented and relationships of NSAS and IDS were discussed. The summarization of studying situation in the world is presented. The architecture of NSAS was proposed in the following. The key technology and difficulties related to building NSAS prototype are discussed. In the end, the future development of NSAS was described.
出处 《计算机科学》 CSCD 北大核心 2006年第10期5-10,共6页 Computer Science
基金 高等学校博士学科点专项科研基金项目(20050217007) 国防预研重点资助项目(413150702) 武备预研基金资助项目(51416060104CB0101)。
关键词 态势感知 网络态势感知系统 数据挖掘 数据融合 态势可视化 Situation awareness, Network situation awareness system, Data mining, Data fusion, Situation visualization
  • 相关文献

参考文献43

  • 1Theureau J.Use of nuclear-reactor control room simulators inresearch & development.In:7th IFAC/IFIP/IFORS/IEA Symposium on Analysis,Design and Evaluation of MAN-MACHINE SYSTEMS,Kyoto.1998.425~430
  • 2Endsley M R.Design and evaluation for situation awareness enhancement.Paper presented at the Human Factors Society 32nd Annual Meeting.Santa Monica,CA,1988
  • 3Bass T,Gruber D.A glimpse into the future of id.http://www.usenix.org/publications /login/1999-9/features/future.html,1999
  • 4Bass T.Intrusion Detection Systems and Multisensor Data Fusion:Creating Cyberspace Situational Awareness.Communications of the ACM,2000,43(4):99~105
  • 5Batsell S G,Rao N S,Shankar M.Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security.http://www.ioc.ornl.gov/projects/documents/containment.pdf,2005
  • 6Shifflet J.A Technique Independent Fusion Model For Network Intrusion Detection.Proceedings of the Midstates Conference on Undergraduate Research in Computer Science and Mathematics,2005,3(1):13~19
  • 7DeMontigny-Leboeuf A,Massicotte F.Passive network discovery for real time situation awareness.NATO/RTO Adaptive Defence in Unclassified Networks,Toulouse,France,April 2004
  • 8Yurcik W,et al.Two visual computer network security monitoring tools incorporating operator interface requirements.ACM CHI Workshop on Human-Computer Interaction and Security Systems(HCISEC),2003
  • 9Lau S.The spinning cube of potential doom.Communications of the ACM,2004,47(6):25~26
  • 10Carnegie Mellon's SEI.System for Internet Level Knowledge (SILK).http://silktools.source forge.net,2005

二级参考文献24

  • 1HANJW KambrM 范明 孟小峰译.数据挖掘-概念与技术[M].北京:机械工业出版社,2001..
  • 2胡华平 等.网络入侵检测、预警和安全管理技术(863-104-02-02)申请书[R].,2001..
  • 3[1]Tim B. Multisensor data fusion for next generation distributed intrusion detection systems[A]. 1999 IRIS National Symposium on Sensor and Data Fusion, Laurel,USA,1999.
  • 4[2]Tim B. Intrusion systems and multisensor data fusion: creating cyberspace situational awareness[J]. Communications of the ACM, 2000, 43(4): 99~105.
  • 5[3]Martin R, Chris G.Snort users manual, Snort release 2.0.0[EB/OL].http://www.snort.org/docs/SnortUsersManual.pdf,2002-07-06.
  • 6[4]Tim B, Roger R. Defense-in-depth revisited:qualitative risk analysis methodology for complex network-centric operations[EB/OL].http://www.silkroad.com/papers/pdf/archives/defense-in-depth-revisited-original.pdf,2002-07-23.
  • 7[5]Honeynet Project.Know your enemy: statistics[EB/OL].http://www.HoneyNet.org/papers/stats/, 2001-07-22.
  • 8JOHN M, ALAN C, JULIA A. Defending yourself: the role of intrusion detection systems[J]. IEEE Softvare, 2000,17(5):42-51.
  • 9PHILLIP A P, PETER G N EMERALD: Event monitoring enabling responses to anomalous live disturbances [A]. In Proceedings of the 1997 National Information Systems Security Conference[C]. Baltimore, MD, October 1997.
  • 10VIGNA, G, KEMMERER R A. Net STAT: a network-based intrusion detection approach. [A] Computer Security Applications Conference, 1998 proceedings[C]. 1998.25-34.

共引文献128

同被引文献848

引证文献123

二级引证文献900

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部