期刊文献+

基于r-连续位匹配规则的入侵检测研究 被引量:1

Intrusion Detection Research Based on r-contiguous Bits Match Rule
下载PDF
导出
摘要 检测器匹配规则和匹配概率是入侵检测系统中构建检测器集和检测器进行有效检测的重要依据。Hofmeyr曾经提出一个基于r-连续位匹配规则的匹配概率分布公式,这个公式在构建检测系统时被广泛使用,但这个公式存在误差。因此提出一个更准确的基于该匹配规则的匹配概率分布公式将对入侵检测系统性能的改进有重要意义。从对这个匹配公式中两个参数r和l的取值范围分析可以得出影响入侵检测系统性能的某些因素。一个实现快速r-连续位匹配的算法的提出,解决了系统进行匹配运算时的时间开销问题。 A more exact/correct probability expression is bright,which calculates the probability for a match between two randomly chosen strings based on the r-contiguous bits match rule.The probability is an important constituent of much work on an Intrusion Detection System(IDS).With a coefficient matrix Ae presented,the exact probability expression modifies an error in Hofmeryr's probability expression using the match rule,which is quoted widely in the IDS. According to the expression,the values of two parameters,r and e,will affect directly the match probability,and also be effective for modeling the receptor of detector set.So it is important to analyse the region of the parameters.Finally the speed of r-contiguous bits match rule algorithm will be presented.This is necessary because the r-contiguous match function is called once for each detector which is to test for recognition of each and every agent (connection)the program monitors.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第29期114-117,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60404021) 广东金融学院科研基金项目(编号:05XJ02-01)
关键词 计算机免疫 入侵检测 检测器 匹配规则 匹配概率 computer immune,intrusion detection,detectors,match rules,probability of a match
  • 相关文献

参考文献2

二级参考文献9

  • 1S Forrest,A S Perelson,L Allen et al.Self-nonself discrimination ina computer[C].In :Proceedings of the 1994 IEEE Symposium on Re-search in Security and Privacy,Los Alamitos,CA :IEEE ComputerSociety Press, 1994
  • 2D'haeseleer Patrik,Forrest Stephanie,Helman Paul. A Distributed Ap-proach to Anomaly Detection [online].University of New Mexico,Available WWW:〈URL:http://www.cs.unm.edu/~forrest/papers.html,1997
  • 3Wespi A,Dacier M,Debar H(IBM Zurich).Intrusion Detection UsingVariable-Length Audit Trail Patterns(RZ 3164).Zurich,Switzerland:IBM Research. Available WWW:〈URL:http://domino.watson.ibm.com/library/C YBERDIG.NSF/95f0a8c5802d9417852566a90057461 f/02a4ec9dSb79ae 14852567da0034838f/3F1LE/rz3164.ps〉, 1999
  • 4P Helman,S Forrest. An efficient algorithm for generating random an-tibody strings[R].Technical Report CS-94-07,The University of NewMexico, Albuquerque, NM, 1994
  • 5P D'haeseleer. Further efficient algorithms for generating antibodystrings[R].Technical Report CS95-3,The University of New Mexico,Albuquerque, NM, 1995
  • 6J Allen,A Christie,W Fithen et al.State of the practice of intrusiondetection technologies[R].Carnegie Mellon University/Software Engi-neering Institute Technical Report CMU/SEI-99-TR-028,2000-01
  • 7蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:369
  • 8杨向荣,宋擒豹,沈钧毅.基于数据挖掘的智能化入侵检测系统[J].计算机工程,2001,27(9):17-18. 被引量:31
  • 9连一峰,戴英侠,王航.基于模式挖掘的用户行为异常检测[J].计算机学报,2002,25(3):325-330. 被引量:84

共引文献8

同被引文献6

  • 1贾志平,杨武,云晓春.一个分布式高效网络入侵检测系统[J].微计算机信息,2006(01X):33-35. 被引量:6
  • 2Esponda F,Forrest S,Helman P.A formal framework for positive and negative detection[J].IEEE Transactions on Systems,Man,and Cybernetics,2004,34(1):357-373.
  • 3Jungwon K,Bentley P J.Toward an artificial immune system for network intrusion detection:An investigation of dynamic clonal selection[C].USA:Proceedings of the Congress on Evolutionary Computation,2002:1015-1020.
  • 4Dasgupta D,Gonzalz F.An immunity-based technique to characterize intrusions in computer networks[J].IEEE Transactions on Evolutionary Computation,2002,6(3):281-291.
  • 5孙啸.生物信息学[DB/OL].东南大学,http://www.lmbe.seu.edu.cn/chenyuan/xsun/bioinfomatics/Web/CharpterThree/3.1.htm.
  • 6王胜和.基于数据挖掘的入侵检测系统设计[J].计算机工程与设计,2004,25(2):243-245. 被引量:8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部