期刊文献+

入侵检测系统的评估方法与研究 被引量:13

Survey in evaluation of intrusion detection system
下载PDF
导出
摘要 在阐述入侵检测系统评估所要解决问题的同时对ROC曲线图、贝叶斯检测率、检测期望值和检测量CID等评估方法进行了深入的研究和分析。发现这些方法只基于某几个指标(如误报率、漏报率)对入侵检测系统进行评价,致使评价结果各有不足,这主要是缘于入侵检测系统的复杂性,对其进行性能评价无疑会涉及影响其性能的每一个主要指标。为此应用一种熵权系数模糊综合评判法,采用模糊综合决策的评估方案,利用熵权系数法计算各指标因素的权重,从而使其能够比较全面地评价一个入侵检测系统。 In an effort to analyze and solve evaluation of intrusion detection system,evaluation methods such as ROC curve,the Bayesian detection rate,the expected cost and the intrusion detection capability have been introduced.The evaluation methods which only involve few evaluation metrics (such as false positive rate,false negative rate) have their own weaknesses,because the complexity of intrusion detection system is the main cause and evaluation of intrusion detection system must involve many performance indexes.In order to achieve the purpose of intrusion detection systems for comprehensive evaluation,this paper gives a method of entropy weight coefficient that is applied to calculate the weight of factors and decrease subjective judgment on the effect of the weight coefficient.Intrusion detection systems are evaluated objectively and comprehensively by the method of entropy weight coefficient.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第9期113-117,共5页 Computer Engineering and Applications
基金 河北省教育厅自然科学基金重点项目(No.Zh2006006)
关键词 网络安全 入侵检测系统 评估 模糊综合评判 network security intrusion detection system evaluation fuzzy comprehensive evaluation
  • 相关文献

参考文献17

  • 1Anderson J P.Computer security threat monitoring and surveillance [tUOL].James PAnderson Co.,Washington,Pennsylvania,1980.http:// seclab.cs.ucdavis.edu/projects/history/CD/ande80.pdf.
  • 2Puketza N,Zhang K,Chung M,et al.A methodology for testing intrusion detection systems[J].IEEE Transactions on Software Engineering, 1996,22(10) :719-729.
  • 3Puketza N,Chung M,Olsson R A,et al.A software platform for testing intrusion detection systems[J].IEEE Software, 1997,14(5). 43-51.
  • 4Durst R,Champion T,Witten B,et al.Testing and evaluating computer intrusion detection systems[J].Communications of the ACM, 1999,42(7) :53-61.
  • 5董晓梅,肖珂,于戈.入侵检测系统评估技术研究[J].小型微型计算机系统,2005,26(4):568-571. 被引量:9
  • 6蔡忠闽,孙国基,卫军胡,管晓宏.入侵检测系统评估环境的设计与实现[J].系统仿真学报,2002,14(3):377-380. 被引量:25
  • 7Lippmann R,Fried D,Graf I,et al.Evaluating intrusion detection systems:the 1998 DARPA Off-Line intrusion detection evaluation[C]// Proceedings of the 2000 DARPA Information Survivability Conference and Exposition,Hilton Head,IEEE,2000,2:323-325.
  • 8Lippmann R,Haines J,Fried D,et al.The 1999 DARPA Off-Line intrusion detection evaluation [J].Computer Networks, 2000,34 (4) : 579-595.
  • 9Lippmann R,Haines J,Fried D,et al.Analysis and results of the 1999 DARPA Off-Line: intrusion detection evaluation[C]//Computer Networks, 2000,34 : 579-595.
  • 10Graf I,Lippmann R,Cunningham R,et al.Resuhs of DARPA 1998 off-line intrusion detection evaluation[C]//DARPA PI Meeting, 15 December 1998.

二级参考文献25

  • 1Korba J. Windows NT Attacks for the Evaluation of Intrusion Detection Systems [EB/OL]. http://www. 11. mit. edu/IST/ideval/pubs/2000/jkorba_thesis. pdf
  • 2Lippmann R, Haines J, Fried D et al. The 1999 DARPA OffLine intrusion detection evaluation [J]. Computer Networks,2000, 34(4): 579-595.
  • 3Lippmann R, Haines J, Fried D, et al. Analysis and results of the 1999 DARPA Off-Line intrusion detection evaluation[EB/OL]. http://www.cs. fit. edu/~pkc/id/related/lippmannraid00. pdf.
  • 4Lippmann R, Haines J, Fried D, et al. Analysis and results of the 1999 DARPA Off-Line intrusion detection evaluation[EB/OL]. http://www. cs. fit. edu/~pkc/id/related/lippmannraid00. pdf.
  • 5Durst R, Champion T, Witten B, et al. Testing and evaluating computer intrusion detection systems [J]. Communications of the ACM, 1999,42 (7): 53-61.
  • 6Pickering K. Evaluating The viability of intrusion detection system benchmarking[EB/OL]. http://www. cs. virginia. edu/~evans/theses/pickering. pdf.
  • 7Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999, 31(8);805-822.
  • 8Paxson V. Bro: A system for detecting network intruders in real-time[J] Computer Networks, 1999, 31(23): 2435-2463.
  • 9Manganaris S, Christensen M, Zerkle D, et al. Data mining analysis of RTID alarms [J]. Computer Networks, 2000, 34(4): 571-577.
  • 10Puketza N, Zhang K, Chung M, et al. A methodology for testing intrusion detection systems[J]. IEEE Transactions on Software Engineering, 1996, 22(10): 719-729.

共引文献33

同被引文献200

引证文献13

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部