期刊文献+

基于误用和异常技术相结合的入侵检测系统的设计与研究 被引量:23

The Design and Research of Intrusion Detection System Based on Misuse and Anomaly
下载PDF
导出
摘要 目前,入侵检测系统(IDS)的漏报率和误报率高一直是困扰IDS用户的主要问题,而入侵检测系统主要有误用型和异常型两种检测技术,根据这两种检测技术各自的优点,以及它们的互补性,将两种检测技术结合起来的方案越来越多地应用于IDS中。该文提出了基于统计的异常检测技术和基于模式匹配的误用检测技术相结合的IDS模型,减少了单纯使用某种入侵检测技术时的漏报率和误报率,从而提高系统的安全性。 Currently, the false positive and the false negative of Intrusion Detection System are very high. It was always the main problem that bothered the user of IDS. But there are tow main technologies applied in IDS. To this problem, because both the technologies have its own advantages and they can supply for each other. So IDS combined with the tow technologies was used more and more widely. This paper presented a model of IDS based on combination of misuse detection and anomaly detection. In this model, misuse detection is based on pattern matching and Anomaly Detection is based on statistical analysis. It combined the tow technologies to reduce the false positive rate and the false negative rate in only one detection technology, and then to improve security of IDS.
出处 《电子与信息学报》 EI CSCD 北大核心 2006年第11期2162-2166,共5页 Journal of Electronics & Information Technology
基金 河北省自然科学基金(F2004000133)资助项目
关键词 入侵检测系统 异常检测 误用检测 模式匹配 统计分析 Intrusion Detection System (IDS), Anomaly detection, Misuse detection, Pattern matching, Statistical analysis
  • 相关文献

参考文献7

  • 1蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 2Fumio Mizoguchi.Anomaly Detection Using Visualization and Machine Learning.IEEE 9th International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises.Gaithersburg,Maryland:March 14-16,2000:165-170.
  • 3Shan Zheng,Chen Peng,Xu Ke,et al..A Network State Based Intrusion Detection Model.2001 International Conference on Computer Networks and Mobile Computing.Beijing,CHINA:October 16 -19,2001:481-486.
  • 4李晓秋,孙学涛,谢余强,杜祝平.入侵检测系统中的快速多模式匹配算法[J].计算机应用与软件,2004,21(2):84-86. 被引量:7
  • 5Koral Ilgun,Richard A.Kemmerer,Phillip A.Porras.State transition analysis:A rule-based intrusion detection approach.IEEE Trans.on Software Engineering,1995-3,21 (3):181-199.
  • 6Nittida Nuansri,Samar Singh,Tharam S.Dillon.A Process State-Transition Analysis and its Application to Intrusion Detection.15th Annual Computer Security Applications Conference.Phoenix,Arizona:December 06-10,1999:378-387.
  • 7Nong Ye,Syed Masum Emran,Xiangyang Li,et al..Statistical Process Control for Computer Intrusion Detection.DARPA Information Survivability Conference & Exposition Anaheim,California:June 12-14,2001,1(1):3-14.

二级参考文献9

  • 1Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 2刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 3Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 4Bian Zhaoqi,Pattern Recognition,1988年
  • 5边肇祺,模式识别,1988年
  • 6何华灿,人工智能导论,1988年
  • 7Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页
  • 8胡侃,夏绍玮.基于大型数据仓库的数据采掘:研究综述[J].软件学报,1998,9(1):53-63. 被引量:257
  • 9阮耀平,易江波,赵战生.计算机系统入侵检测模型与方法[J].计算机工程,1999,25(9):63-65. 被引量:49

共引文献374

同被引文献128

引证文献23

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部