期刊文献+

基于混合模型的入侵检测系统设计

Intrusion Detecting with Multiple-models
下载PDF
导出
摘要 随着Internet的高速发展,网络安全问题越来越引人注目,入侵检测系统越来越多地引起了人们的重视。本文提出一个基于混合模型的入侵检测系统,从系统调用,审计日志,网络协议三个层次,分析数据特征,建立相应的检测模型。使系统既可以检测新的攻击,又可以具有较低的误警率。 With the rapid development of Intemet, network security is more and more important, so more and more studies have been focused on intrusion detection systems. This paper presents an Intrusion Detecting with Multiple-models. System analyzes data from log, system call and network traffic, and builds multiple-models. It is given the character of ability to detect novel intrusion and low false positive.
出处 《贵阳学院学报(自然科学版)》 2006年第1期21-24,共4页 Journal of Guiyang University:Natural Sciences
关键词 入侵检测 异常检测 系统调用 Intrusion Detection Abnormal Detection System Call
  • 相关文献

参考文献6

二级参考文献13

  • 1张学工译.统计学习理论的本质[M].北京:清华大学出版社,1995..
  • 2Stephanie Forrest, Steven, A. Hofmeyr, Anti Somayaji. A Seace of Self for Unix Processes[A] .IEEE Symposium on Security and Privacy[C].Oakland, California IEEE Computer Society, 1996. 120 - 128.
  • 3Christina Warrender, Stephanie Forrest, Barak Pearlmutt. Detecting Intrusions Using System Calls: Alternative Data Model[ A]. 1999 IEEE Symposium on Security and Privacy[C]. 1999.133 - 145.
  • 4R Dugad, U B Desai. A Tutorial on Hidden Markov Models [ OL] url.http://vision. ai. uiuc. edu/dugad/guestbook/addHMMguest, html.
  • 5Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras. State transition analysis: a rule-based intrusion detection approach[J]. IEEE Trans. on Software Engineering, March 1995,21 (3) : 181 - 199.
  • 6Teresa F lunt,R Jagannnthan, Menlo Park. A Prototype Real-Time Intrusion-Detection Expert System[A]. 1988 IEEE Symposium on Security and Privacy[C]. 1988.59 - 65.
  • 7Yanqiao. Xie Weixin. Yangbin Songge. An anomaly intrusion detection method based on HMM[J]. Eletronics Leeters,2002, 38(13) :663 -664.
  • 8Wenke Lee Dong Xiong. Information-Theoretic Measures for Anomaly Detection[A]. Proceedings IEEE Symposium on Security and Privacy[ C]. IEEE Computer Society, Oakland, California, USA. May 14 - 16,2001.
  • 9胡昌振,面向21世纪网络安全与防护,1999年
  • 10Norris Ed,Computer Security J,1998年,12卷,2期,21页

共引文献113

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部