期刊文献+

基于windows平台下的入侵检测系统 被引量:2

Intrusion Detection System Based on Windows
原文传递
导出
摘要 入侵检测系统是对"防火墙"、"数据加密"等安全系统的有效补充。它能够帮助网络系统快速发现黑客攻击,并且扩展了系统管理员的安全管理能力,提高了信息安全基础结构的完整性。文中分析了入侵检测系统的原理,设计了基于windows平台下的入侵检测系统,并对snort的检测算法进行了改进,同时对系统进行了测试,验证了实验结果。 Intrusion Detection System is an effective supplement to "firewall", "data encryption", and other security systems. It can help quickly identify network hacker attacks, extend the safety management capability of system administrators, and improve information security infrastructure integrity. This paper analyzes the principle of intrusion detection system and gives the design of windows platform based intrusion detection system, including the improvements on the snort detect algorithm. And the test on the system has verified the experimental results.
出处 《通信技术》 2007年第12期296-298,共3页 Communications Technology
关键词 网络安全 入侵检测系统 SNORT network security intrusion detection system snort
  • 相关文献

参考文献2

  • 1Biermann E, Cloete E, renter H L. A Comparison of Intrusion Detection Systems [J]. Computers & Security, 2001, (20) :676-683.
  • 2Han H, Lu L H. Data Mining Aided SignatureDiscovery in Network-based Intrusion Detection System[Z]. ACM SIGOPS Operating Systems Review, 2002,36(04): 7-13.

同被引文献12

  • 1李新广,李宛灵,李斌.网络信息的入侵检测[J].通信与信息技术,2007(1):100-104. 被引量:1
  • 2Dionysus Blazakis. Interpreter Exploitation :Pointer Inference and JIT Spraying [ R ]. Black Hat Federal, 2010.
  • 3CHEN Xiabo, XIE Jun. Defeat Windows 7 Browser Memory Protection [ R]. XCon 2010.
  • 4Derek Soeder. Memory Retrieval Vulnerabil- iYes [ EB/OL]. http: //www. eeye. corn/ eEyeDigitalSecurity/media/ResearchPapers/ eeyeMRV-Oct2006, pdf, 2006.
  • 5Ben Hawkes. Attacking the Vista Heap [ EB/ OL ]. http: //www. lateralsecurity, corn/ downloads/hawkes_ ruxcon - nov - 2008. pdf, 2008-11.
  • 6Chris Valasek. Understanding the Low Frag- mentation Heap [ EB/OL ]. http. //illmat- ies. com/Understanding_ the LFH Slides.pdf, July, 2010.
  • 7Tarjei Mandt. Kernel Attacks through User- Mode Callbacks [ R ]. USA, Black Hat, 2011.
  • 8Chris Valasek, Tarjei Mandt. Windows 8 Heap Internals [ R ]. USA, Black Hat, 2012.
  • 9张明磊,单蓉胜,李小勇.基于Windows系统调用的异常检测模型[J].信息安全与通信保密,2007,29(11):56-57. 被引量:1
  • 10王颖.网络安全与入侵检测技术浅析[J].辽宁师专学报(自然科学版),2007,9(3):47-48. 被引量:5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部