期刊文献+

一个改进的入侵检测系统模型 被引量:1

A Modified Model of Intrusion Detection System
下载PDF
导出
摘要 首先介绍了模式匹配技术的工作过程,接着分析了B-M匹配算法,进而指出了该技术存在的主要缺点;然后介绍了协议分析技术的检测攻击过程,说明了它的技术优势;最后将两项技术有机结合了起来建立了一个新的检测模型。研究表明,该模型检测速度快、效率高,并且大大降低了漏报率。 Firstly,working process of pattern matching is introduced,and B-M algorithm is analysed,and main disadvantages are pointed out.Then an effective detec- tion method which is called protocol analysis is pro- posed;and its advantage is explained.Finally,based on the two kinds of technologies,the modified model of in- trusion detection is established.
出处 《计算机与数字工程》 2007年第1期97-99,共3页 Computer & Digital Engineering
关键词 模式匹配 协议分析 入侵检测 pattern matching protocol analysis intrusion detection
  • 相关文献

参考文献6

二级参考文献19

  • 1Protocol Analysis and Command Parsing vs.Pattern Matching in In-trusion Detection System.http://www.networkice.com
  • 2[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000
  • 3[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998
  • 4[3]Brian Caswell.snort.http:∥www.snort.org/
  • 5[4]ISS Company. RealSecure Network Protection.http:∥www.iss.net/products_services/enterprise_protection/rsnetwork/index.php
  • 6[5]Ilgun K,Kemmerer R A,Porras P A.State transition a.nalysis:A rulebased intrusion detection approach[J].Software Engineering,IEEE Transactions on, 1995; 21 (3): 181 ~ 199
  • 7[6]Vigna G,Kemmerer R A.NetSTAT:A Network-based Intrusion Detection Approach[C].In:Proceedings of the 14th Annual Computer Security Applications Conference(ACSAC), 1998
  • 8[7]Alec Yasinsac. An Environment for Security Protocol Intrusion Detection[J].Journal of Computer Security,2002; (10): 177~188
  • 9[8]Shan Zheng,Chen Peng,Xu Ying et al.A network state based intrusion detection model. Computer Networks and Mobile[C].In:Computing,2001.Proceedings.2001 International Conference on,2001:481~486
  • 10[9]Karen Kent Frederick. Network Intrusion Detection Signatures,Part 5.http:∥online.securityfocus.com/infocus/1569,2002

共引文献54

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部