期刊文献+

基于IDMEF的协作式入侵检测技术研究 被引量:1

Research on the Cooperative Intrusion Detection Technology of Base-IDMEF
下载PDF
导出
摘要 介绍了入侵检测技术的发展和现状,阐述了协作式入侵检测技术中信息交换的产生背景和功能要求。主要讲述了如何利用入侵检测信息交换格式-IDMEF(Intrusion Detection Message Exchange Format)和入侵检测交换协议-IDXP(Intrusion Detection Exchange Protocol)来实现多个入侵检测系统之间的信息交换。 This article introduce the development of the Intrusion Detection Technology. It elucidates background of produce and requirement of function of information exchange of cooperative intrusion detection technology. Particularly discusses how to use IDMEF( Intrusion Detection Message Exchange Format) and IDXP (Intrusion Detection Exchange Protocol) to exchange the information among the intrusion detectionsystem.
出处 《微处理机》 2007年第5期34-37,共4页 Microprocessors
关键词 入侵检测交换协议 入侵检测消息交换格式 可扩展标记语言 块可扩展交换协议 IDXP IDMEF XML ( Extensible Markup Language ) BEEP ( Blocks Extensible Exchange Protocol)
  • 相关文献

参考文献5

二级参考文献23

  • 1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
  • 2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
  • 3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
  • 4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
  • 5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
  • 6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
  • 7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
  • 8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
  • 9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989
  • 10[1]Snapp R S,Brentano James,Dias V G, Terrance L,Goan L,Todd Heberlein, Ho Che-Lin, Levitt N, Biswanath Mukherjee, Stephen E Smaha Tim Grance, Teal M and Mansur Doug.DIDS (Distributed Intrusion Detection System)-Motivation,Architecture, and An Early Prototype.Computer Security Laboratory Division of Computer Science University of California,Davis

共引文献121

同被引文献14

  • 1李琴,曾凡平,李凌,尹凯涛.基于IDS的网络攻击效果评估系统[J].信息安全与通信保密,2008,30(2):79-80. 被引量:1
  • 2冯立功.基于XML技术的IDMEF在分布式入侵检测系统中的应用[J].计算机安全,2004(11):11-12. 被引量:7
  • 3裴晋泽,肖枫涛,胡华平,黄辰林.统一入侵检测报警信息格式提案及其实现[J].计算机应用研究,2006,23(2):107-110. 被引量:4
  • 4郭帆,余敏,叶继华.一种基于关联和代理的分布式入侵检测模型[J].计算机应用,2007,27(5):1050-1053. 被引量:6
  • 5KABIRI P, ALl A G. Research on intrusion detection and response: a survey[J]. International Journal of Network Security, 2005, 1(2): 84-102.
  • 6SPAFFORD E H, ZAMBONI D. Intrusion detection using autonomous agents[J]. Computer Networks, 2000, 34(4): 547-570.
  • 7SUNG M, XU Jun. IP traceback-based intelligent packet filtering: a novel technique for defending against interet DDOS attacks[J]. IEEE Trasactions on Parallel and Distributed Systems, 2003, 14(9): 861-872.
  • 8BELLARE M, POINTCHEVAI D, ROGAWAY E Authenticated key exchange secure against dictionary attack [C]//Advances in Cryptology- EUROCRYPT'00. [S.l.]: LNCS, 2000.
  • 9Prelude speeifications[EB/OL]. [2008-04-05]. https: //trac.prelude-ids.org/wiki/PreludeHandbook.
  • 10IETF. Incident handling: real-time inter-network defense[EB/OL]. [2008-04-05]. http: //www. ietf. org/ intemet2drafts/draft-ietf-idwg- idmef-xm-216. txt.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部