期刊文献+

网络入侵检测系统的研究 被引量:1

Research of network intrusion detection system
下载PDF
导出
摘要 随着计算机网络的发展,计算机网络安全作为一个无法回避的问题呈现在人们面前,而随着攻击者知识的日趋成熟,攻击工具与手段的日趋复杂,入侵检测系统作为一种重要检测手段应运而生。首先对入侵检测系统进行讨论,分析两种入侵检测系统及今后的发展方向,进而提出基于协议分析的分布式入侵检测系统的模型和工作流程。 The computer network security has emerged unavoidobly as a problem since the computer network develops. The more complex the intruding tools and methods, the more richer the knowledge of the intruder. Discussion is made on the intrusion detection system, including two sets of systems with the models and operating process. And it also presents the prospect of the system for the future development.
出处 《黑龙江工程学院学报》 CAS 2007年第3期27-29,共3页 Journal of Heilongjiang Institute of Technology
基金 哈尔滨市科学技术局学科后备带头人基金项目(2005AFXXJ039)
关键词 入侵检测系统 网络协议 网络安全 intrusion detection system network protocol network security
  • 相关文献

参考文献3

二级参考文献20

  • 1[1]D E Denning. An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2) :222-2
  • 2[2]G Vigna,R A Kemmerer. NetSTAT:A Network-based Intrusion Detection Approach[C].Proceedings of the 14th Annual Computer Security Conference,Scottsdale,Arizona, 1998.12
  • 3[3]S Kumar. Classification and Detection of Computer Intrusions[D].PhD Dissertation. Department of Computer Sciences,PurdueUniversity,1995
  • 4[4]J Balasubramaniyan,J Omar Garcia-Fernandez,D Isacoff et al.An Architecture for Intrusion Detection using Autonomous Agents[R].Department of Computer Sciences,Purdue University,Coast TR 98-05,1998
  • 5[5]Frincke D,Don Tobin,Jesse McConnell et al.A Framework for Cooperative Intrusion Detection[C].Proceedings of the 21 st National Information Systems Security Conference,1998.10:361-373
  • 6[6]W Lee,S J Stolfo,K Mok. A Data Mining Framework for Building Intrusion Detection Models[C].Proceedings of the IEEE Symposium on Security and Privacy, 1999
  • 7[7]Guy Helmer,Johnny S K Wong,Vasant Honavar et al.Intelligent Agents for Intrusion Detection[C].Proceedings,IEEE Information Technology Conference, Syracuse, NY, 1998.9:121-124
  • 8[8]M Conner,C Patel,M Little. Genetic Algorithm/Artificial Life Evolution of Security Vulnerability Agents[C].Army Research Laboratory Federal Laboratory 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program(ATIRP),1999.2
  • 9[9]Jacobs S,D Dumas,W Booth et al.Security Architecture for Intelligent Agent Based Vulnerability Analysis[C].Proceedings:3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution Research Program, College Park, MD.37,1999.2: 447-451
  • 10[10]Barrett Michael,W Booth,M Conner et al. Intelligent Agents System Requirements and Architecture[R].Report to ATIRP,1998.10

共引文献65

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部