期刊文献+

入侵检测系统研究

Research on Intrusion Detection System
下载PDF
导出
摘要 入侵检测系统是基础设施安全系统的最重要组成部分之一。主要从入侵检测系统的定义、原理、入侵检测系统模型、分类方法、检测技术、评价标准几个方面对入侵检测做了研究。最后指出了当前入侵检测系统存在的不足以及未来应做的工作。 Intrusion Detection System is one of the most important components of infrastructure security system.The paper mainly describes the concepts,principle,taxonomy,detection techniques and evaluation criterion.Finally,the problems facing IDS and researches that should be done in the future are mentioned.
作者 陈竞 苗茹
出处 《电脑知识与技术》 2007年第7期37-39,共3页 Computer Knowledge and Technology
关键词 入侵检测 异常检测 误用检测 Intrusion Detection Anomaly Detection Misuse Detection
  • 相关文献

参考文献2

二级参考文献30

  • 1..http://www. ietf. org/html. charters/idwg-charter. html,Apri14,2002.
  • 2[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 3[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 4[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 5[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 6[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 7[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 8Anderson J P. Computer security threat monitoring and surveillance: [Technical report]. James P. Anderson Company, FortWashington,Pennsylvania,April 1980.
  • 9Staniford-Chen S, Cheung S, Crawford R, et al. GRIDS - A Graph Based Intrusion Detection System for Large Networks. In: 20^th National Information System Security Conf (NISSC) ,Oct. 1996.
  • 10Cheung, Steven, Crawford R, et al. The Design of GRIDS: A Graph-Based Intrusion Detection System: [Technical report CSE-99-02]. The University of California, Davis Department of Computer Science. Jan. 1999.

共引文献149

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部