期刊文献+

基于攻击树的分布式入侵检测系统的研究 被引量:2

Attack Tree Based of Distributed IDS Research
下载PDF
导出
摘要 入侵检测是计算机安全领域的一个重要技术,也是当前计算机安全理论研究的一个热点,首先介绍分布式入侵检测发展现状,然后引入攻击树来表示入侵,并提出一个基于攻击树的攻击描述语言。并在此基础上建立了基于攻击树的分布式入侵检测系统结构。 With the development of computer technology and the explosion of Internet, computer security becomes more and more important. The concept of attack trees is introduced first. Then based on the attack tree model, an attack specification language is constructed using this language, we define attack template library and build a structure of attack tree-based of distributed intrusion detection system.
出处 《计算机与数字工程》 2007年第2期101-103,116,共4页 Computer & Digital Engineering
关键词 入侵检测 分布式入侵检测系统 攻击树 攻击树描述语言 intrusion detection, distributed IDS, attack tree, attack tree specification language
  • 相关文献

参考文献5

  • 1T. Tidwell, R. Larson, K. Fitch and J. Hale. Modeling Internet Attacks[C]. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security,2001:54 - 59
  • 2Staniford - Chen S, Cheung S, Crawford R etal. GrIDS:a graph based intrusion detection system for large networks[C]. In Proceedings of the 19th National Information Systems Security Conference, National Institute of Standards and Technology, 1996:361 - 370.
  • 3陈硕,安常青,李学农.分布式入侵检测系统及其认知能力[J].软件学报,2001,12(2):225-232. 被引量:44
  • 4马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 5W.Richard Stevens著,施振川,周利民,孙宏晖等译.UNIX网络编程(第一卷)[M].清华大学出版社,1999,7

二级参考文献8

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8靳蕃.神经网络与神经计算机的基本原理和应用[J].计算机应用,1991,11(2):54-57. 被引量:20

共引文献158

同被引文献14

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部