期刊文献+

分布式入侵检测中的数据融合模型 被引量:4

Data Fusion Model in Distributed Intrusion Detection
下载PDF
导出
摘要 针对传统的入侵检测系统存在的误警率高、存在告警洪流、告警孤立等缺点,引入了数据融合方法,提出了一个分布式入侵检测中的数据融合模型。该模型对告警进行分类,采用D-S理论对多IDS告警进行融合,基于前提和后果的方法对告警进行关联,最后量化系统受威胁程度,提供了一个解决上述问题的框架和方法。 Aiming at the problem of traditional intrusion system,such as high false alert rate,alert torrent,alert isolation,a data fusion model in distributed intrusion detection is put forward.This model classifies alerts,employs D-S theory to fuse alerts of several IDS and method based on prerequisite and consequent to correlate alerts,quantifies the security risk of system and provides a framework and method to solve the above problems.
出处 《计算机与数字工程》 2007年第4期97-99,共3页 Computer & Digital Engineering
关键词 入侵检测 数据融合 告警分类 D—S理论 关联 intrusion detection,data fusion,alert classification,D-S theory,correlation
  • 相关文献

参考文献3

  • 1P.Ning,Y.Cui,and D.S.Reeves.Constructing attack scenarios through correlation of intrusion alerts[ C ].In Proceedings of the 9th ACM Conference on Computer and Communications Security.Washington.D.C.,245~254,2002,11
  • 2Yong Wang,Huihua Yang,Xingyu Wang and Ruixia Zhang.Distributed intrusion detection system based on data fusion method[ C ].Proceedings of the Fifth World Congress on Intelligent Control and Automation,Volume5,4331~4334,2004,4
  • 3李辉,蔡忠闽,韩崇昭,管晓宏.基于信息融合的入侵检测模型与方法[J].小型微型计算机系统,2003,24(9):1602-1606. 被引量:9

二级参考文献14

  • 1Fox K L,Henning R R, Reed J H, et al. A neural network approach toward intrusion detection[C].In : Proceedings of the 13th National Computer Security Conference, 1990,10.
  • 2Porras P. Kemmerer R. Penetration state transition analysis -a rule based intrusion detection approach[C].In:Proceedings of the Eight Annual Computer Security Application Conference, 1992.220-229.
  • 3Ming-Yuh Huang,Robert J.Jasper.A large scale distributed intrusion detection framework based on attack strategy analysis[]]. Computer Networks 1999,31. 2465-2475.
  • 4Tim Bass Intrusion Detection System -. Multisensor Data Fusion:Create Cyberspace Situational Awareness[J]. Communication of the ACM. 2000,43(4) ,99-105.
  • 5Mitiche A. Aggarwal JK multsi sensor integration/fusion through image processing : Arevial[J]. Optical Engineering. 1986,25 (3) :380-386.
  • 6Eugene Charniak Bayesian. Networks without tears[J]. AI Magazine,Winter 1991, 50-63.
  • 7Zhang yan-duo,Hong bing-rong. Recognition to the robot football from the view of information fusion[J]. Robots and Application,2001,1(1):33-35.
  • 8Kang yao-hong. Theory and application of data fusion[M]. Xi'an, XDUP 1999.
  • 9White F. A model for data fusionCC3. SPIE Conference on Sensor Fusion Orlando,FL. April, 1988.
  • 10Julia Allen, Alan Christie, William Fithen,John McHugh,Jed Pickel, Ed Stoner. State of the practice of intrusion detection technologies[R]. Networked Systems Survivability Program,Technical Report CMU/SEI-99-TR-028 ESC-99-028.

共引文献8

同被引文献14

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部