期刊文献+

一种适用于宽带网络的入侵检测系统的设计与实现 被引量:4

Design and Realization of a Intrusion Detection System for Broadband Network
下载PDF
导出
摘要 宽带高速网络的实时入侵检测技术是当今信息安全中的一个热门研究课题,文章介绍了入侵检测系统的概念,提出了一种网络实时入侵检测系统模型,根据此模型,从IDS的体系结构和算法上入手,探索设计了一种适合于宽带网络的实时入侵检测方案,并介绍了实现的关键技术和方法。 Real-time intrusion detection technology for high speed broadband network is a hot research area now. This article first introduces the concept of intrusion detection system (IDS), and then puts forward a model of real-time intrusion detection system. According to this model, the author designs a real-time intrusion detection system for broadband network after analyzing the architecture and algorithm of IDS, and introduces its key technologies and methods.
出处 《四川理工学院学报(自然科学版)》 CAS 2007年第3期82-85,共4页 Journal of Sichuan University of Science & Engineering(Natural Science Edition)
关键词 宽带网络 入侵检测 多线程 多缓冲区 broadband network intrusion detection multi-threads multi-buffers
  • 相关文献

参考文献4

  • 1毛功萍,熊齐邦.基于策略的入侵防御系统模型的研究[J].计算机应用研究,2006,23(3):126-127. 被引量:11
  • 2郎良,张玉清,钱秀槟,等.漏洞检测与自动防御系统模型的研究与实现[C].中国计算机大会论文集,北京:清华大学出版社,2003,324—330,
  • 3Brian Caswell,Jay Beale,James C Fostor,et al.Snort 2.0 Intrusion Detection[M].Scbastopol,CA:syngress publishing,Inc.,2003.
  • 4Zhang Xinyou,Li Cengzhong,Zheng Wenbin.Intrusion Prevention System Design[J].Computer and Information Technology,2004:386-390.

二级参考文献7

  • 1Yao-Min Chen,Yanyan Yang.Policy Management for Network-based Intrusion Detection and Prevention[J].Network Operation and Ma-nagement Symposium,2004,(2):219-232.
  • 2L P Gaspary,L F Balbinot,L R Tarouco.Monitoring High-Layer Protocol Behavior Using the Trace Architecture[J].Network Operation and Management Symposium,2001,(1):99-110.
  • 3Definitions of Management Objects for the Delegation of Management Scripts[S].RFC3165,IETF,2001.
  • 4BrianCaswell JayBeale etal 宋敬松.Snort 2.0 Intrusion Detection [M].北京:国防工业出版社,2004..
  • 5K Llgun,R A Kemmerer,P A Porras.State Transition Analysis:A Rule-based Intrusion Detection System[J].IEEE Transactions on Software Engineering,1995,21:181-199.
  • 6Xinyou Zhang,et al.Intrusion Prevention System Design[J].Computer and Information Technology,2004:386-390.
  • 7梁琳,拾以娟,铁玲.基于策略的安全智能联动模型[J].信息安全与通信保密,2004,26(2):35-37. 被引量:3

共引文献11

同被引文献18

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部