期刊文献+

支持高精度告警的入侵检测系统的设计与实现

The Design and Implementation of IDS Supporting High-precise Alert
原文传递
导出
摘要 目前入侵检测系统(IDS)得到了越来越广泛的重视,发展日益迅速。然而,IDS在可用性、易用性方面还存在着较大的问题,其中一个方面表现在IDS提供的告警信息过于简单,基于这些信息用户难以对攻击的特点有全面清晰的认识,从而给IDS的发展带来了困难。本文在对网络攻击进行有效分类的基础上,提出了一种支持高精度告警的入侵检测系统,使得IDS能够将网络攻击的主要特征反馈给用户,从而让用户能够准确全面的了解攻击,及时采取相应的防范措施。 IDS is more and more important now, and it's just developing very fast. However, there still lie some problems in IDS, of which a critical one is the alert information seems too simple, and the users are hardly to know the key point of network attack, which makes it diffi- cult for the developing of IDS. Based on the classification of network attack, a new kind of IDS has been implemented. The new IDS can provide high-precise alert messages and supply the main characteristics to user. Then the users can immediately get to know the total aspects of the network attack and take correct actions to prevent it.
作者 袁忠良
出处 《世界科技研究与发展》 CSCD 2008年第1期34-37,共4页 World Sci-Tech R&D
关键词 入侵检测系统 高精度 告警 插件 IDS highly-precise alert plugins
  • 相关文献

参考文献10

二级参考文献31

  • 1[1]Kumar S,Spafford E H.An Application of Pattern Matching in Intrusion Detection.Technical Report CS D-7R-94-013.Department of Computer Science,Purdue University,1994
  • 2[2]Kumar S,Spafford E H.A Pattern Matching Model for Misuse Intrusion Detection.Department of Computer Science,Purdue University,1994
  • 3[3]Navarro G.Multiple Approximate String Matching by Counting.In Proc.WSP′97,Carleton University Press,1997:125-139
  • 4[4]Baeza-Yates R,Gonnet G.A New Approach to Text Searching.Comm of the ACM,1992,35( 10):74-82
  • 5[1]Roesch M. Snort-Lightweight Intrusion Detection For Networks[EB/OL]. www.snort.org,1999-09.
  • 6[2]Desai N. Increasing Performance in High Speed NIDS,A look at Snorts Internals[EB/OL]. http://www.cis.udel.edu/~zhi/www.docshow.net,2002-03.
  • 7COHEN F. Information system attacks: a preliminary classification scheme[J]. Computers and Security, 1997, 16(1):29-46.
  • 8TEKLA P, PAUL W. Can computer crime be stopped?[J]. IEEE Spectrum, 1984, 21(5): 34-45.
  • 9RUSSELL D, GANGEMI G. Computer Security Basics[M]. O'Reilly & Associates, Inc, 1991.
  • 10NEUMANN P, PARKER D. A summary of computer misuse techniques[A]. The 12th National Computer Security Conference[C]. USA, 1989. 396-407.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部