期刊文献+

基于IDS报警信息源的入侵检测 被引量:2

Intrusion Detection Research Based on Alarm Information of IDS
下载PDF
导出
摘要 对入侵检测系统产生的报警信息进行二次分析已经成为改善入侵检测系统检测性能的一个重要的、实际可行的手段。在对入侵检测系统报警信息进行分析的基础上,提出了全面对报警信息进行根源分析和关联分析的框架,并给出了具体实现方法。实验结果证实了该方法的有效性。 Second analyzing Intrusion Detection System (IDS)'s alarm information has already become an important and practical method of improving IDS's detection performance. The paper roundly provides root cause and correlation analysis of alarm information based on analyzing IDS's alarm information, giving the practical method, the experiment proves the method' s validity.
出处 《计算机应用研究》 CSCD 北大核心 2007年第1期161-163,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2003AA144030) 国家"973"重点基础研究发展规划项目(G1999035810) 中国科学院软件所基础课题研究基金项目(CXK45634) 北京机械工业学院人才引进基金项目(59525027(J))
关键词 入侵检测 检测率 根源分析 关联分析 Intrusion Detection Detection Bate Boot Cause Analysis Correlation Analysis
  • 相关文献

参考文献6

  • 1Denning D E.An Intrusion Detection Model[J].IEEE Trans.on Software Engineering,1987,13(2):222-232.
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:231
  • 3刘雪飞,马恒太,张秉权,吴伯桥,蒋建春,文伟平.NIDS报警信息关联分析进展研究[J].计算机科学,2004,31(12):61-64. 被引量:2
  • 4HanJiawei MichelineKambe.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 5Stefanos Manganaris,et al.A Data Mining Analysis of RTID Alarms[J].Computer Networks,2000,34(4):571-577.
  • 6Chris Clifton,Gary Gengo.Developing Custom Intrusion Detection Filters Using Data Mining[C].Los Angeles:2000 Military Communications International Symposium,2000.

二级参考文献73

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献379

同被引文献16

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部