期刊文献+

大规模网络宏观预警的研究现状与分析 被引量:2

Research situation and analysis of large-scale network macro alert
下载PDF
导出
摘要 对国内外的宏观预警技术的研究现状进行了综述,依据宏观预警系统的实施过程对当前研究方法和研究成果进行了较为全面的概述与分析,对现有技术进行了总结与归纳。 This paper reviewed the situation of macro alert research in internal and abroad, summarized the characters of existing technology according to the implementing process of the macro alert system.
出处 《计算机应用研究》 CSCD 北大核心 2008年第2期321-326,共6页 Application Research of Computers
基金 国家“863”计划资助项目(2002AA142020) 国家自然科学基金资助项目(60403033)
关键词 宏观预警 入侵检测 数据融合 威胁评估 决策响应 macro alert intrusion detection data fusion threaten assessment alert response
  • 相关文献

参考文献45

  • 1RATHMELL A, OVERILL R, VALERI L. Information warfare attack assessment system( IWAAS) [ R] . London: Information Warfare Seminar,1997.
  • 2RATHMELL A, DORSCHNER J, KNIGHTS M, et al. Summary of research results: threat assessment and early warning methodologies for information assurance[ EB/ OL] . ( 2003) . http: / /www. iaac. org.uk /Publications/ ROPA/Website% 20summary. pdf.
  • 3胡华平,张怡,陈海涛,宣蕾,孙鹏.面向大规模网络的入侵检测与预警系统研究[J].国防科技大学学报,2003,25(1):21-25. 被引量:43
  • 4张险峰,秦志光,刘锦德.网络安全分布式预警体系结构研究[J].计算机应用,2004,24(5):36-39. 被引量:15
  • 5TREURNIET J. An overview of passive information gathering techniques for network security[ EB/OL] . [ 2006 -11 - 09] . http: / /www.ottawa. drdc-rddc. gc . ca /docs /e /TM2004- 073 . pdf.
  • 6OATES T. Cooperative information gathering: a distributed problem solving approach[ R] . [ S. l. ] : UMASS, 1994 .
  • 7HE Yong-chun, WANG Cong, QIU Jian. An information gathering model based on mobile agents[ C] / /Proc of Networking, Sensing and Control. 2005: 225- 228.
  • 8ZHU Jin, PAPAVASSILIOU S. A resource adaptive information gathering approach in sensor networks[ C] / /Proc of IEEE Sarnoff Symposium on Advances in Wired and Wireless Communications. 2004:115 -118.
  • 9Cisco IOS NetFlow introduction[ EB/OL] . [ 2006 - 09 ] . http: / /www.cisco. com/en/US/products / ps6601 /products _ ios _ protocol _ group _home. html.
  • 10PORRAS P A, NEUMANN P G. EMERALD: event monitoring enabling response to anomalous live disturbances [ C] / /Proc of National Information Systems Security Conference. 1997: 120-126 .

二级参考文献51

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2胡华平 等.网络入侵检测、预警和安全管理技术(863-104-02-02)申请书[R].,2001..
  • 3[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980.
  • 4[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232.
  • 5[3]Biswanath, Mukherjee, Heberlein, L.Todd. Network intrusion detection. IEEE Network, 1994,8(3):26~41.
  • 6[4]Javitz, H.S., Valdez, A. The SRI IDES statistical anomaly detector. In: Teresa, F.L., ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1991.
  • 7[5]Sobirey, M. Adaptive intrusion detection system (AID). 1998. http://www-rnks. informatik.tu-cottbus.de/~sobirey/aid.e.html.
  • 8[6]Heberlein, L.T., Dias, G.V., Levitt, K.N., et al. A network security monitor. In: IEEE ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1990. 296~304.
  • 9[7]Snapp, S.R., Brentano, J., Dias, G.V., et al. A system for distributed intrusion detection. In: Teresa, F.L., ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1991.
  • 10[8]Clifford, K., Porras, P.A. A common intrusion detecction framework. 1997. http://seclab.cs.ucdavis.edu/cidf.

共引文献418

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部