期刊文献+

基于IPS的FTP协议事件检测引擎的设计与实现

DESIGN AND IMPLEMENTATION OF FTP EVENT DETECTION ENGINE BASED ON IPS
下载PDF
导出
摘要 事件检测引擎是基于FTP协议解析引擎中的重要组成部分之一。在对传统的网络安全技术进行研究的基础上,设计和实现了基于IPS的FTP协议事件检测引擎。阐述了FTP协议事件检测引擎的总体框架,建立了相关的模型。该引擎采用先进的NEL语言开发平台,实时地检测出异常流量,实现了实时、高性能的网络安全。 Event detection engine is an important part of protocol analysis engine based on FTP. According to the studies on traditional network security technology, the design and implementation of an FTP event detection engine based on IPS is presented. The architecture and functions of an FTP event detection engine is described with the related model. In the Event detection engine, advanced NEL is used as the development platform, anomaly network flow can be detected real-timely. A real-time and high performance network security is realized.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第6期14-15,29,共3页 Computer Applications and Software
基金 国家自然科学基金(60273079)资助 辽宁省自然科学基金(20052031)资助
关键词 IPS 协议限制规则 FTP NEL IPS Protocol restriction rules FTP Neteye event language(NEL)
  • 相关文献

参考文献7

  • 1李小平,王意洁,王勇军.入侵防御系统的研究与设计[J].微计算机信息,2006,22(11X):88-90. 被引量:12
  • 2毛功萍,熊齐邦.基于策略的入侵防御系统模型的研究[J].计算机应用研究,2006,23(3):126-127. 被引量:11
  • 3李健,顾国昌,张国印.基于代理技术的入侵防御系统研究[J].计算机工程与应用,2005,41(31):116-118. 被引量:4
  • 4Levine, Labella R, Owen H. The Use of Honeypots to Detect Exploited Systems Across Large Enterprise Networks [ C ]. In Proceedings of the 2003 IEEE Workshop on Information Assurance ,2003,6.
  • 5NEL 开发联盟.NetEye Event Language技术白皮书[M].沈阳:东软软件股份有限公司,2006.
  • 6Oekapetris. RFC1034 ( DOMAIN NAMES-CONCEPTS AND FACILITIES) [ S ]. Network Working Group, 1987:2 - 5.
  • 7Ockapetris. RFC1035 ( DOMAIN NAMES-IMPLEMENTATION AND SPECIFICATION) [ S ]. Network Working Group, 1987:80 - 93.

二级参考文献25

  • 1刘萍萍,周求湛,徐昊,申铉京.混合型分布式入侵检测系统模型[J].吉林大学学报(工学版),2004,34(4):666-670. 被引量:6
  • 2高光勇,迟乐军,王艳春.联动防火墙的主机入侵检测系统的研究[J].微计算机信息,2005,21(07X):66-68. 被引量:23
  • 3Yao-Min Chen,Yanyan Yang.Policy Management for Network-based Intrusion Detection and Prevention[J].Network Operation and Ma-nagement Symposium,2004,(2):219-232.
  • 4L P Gaspary,L F Balbinot,L R Tarouco.Monitoring High-Layer Protocol Behavior Using the Trace Architecture[J].Network Operation and Management Symposium,2001,(1):99-110.
  • 5Definitions of Management Objects for the Delegation of Management Scripts[S].RFC3165,IETF,2001.
  • 6BrianCaswell JayBeale etal 宋敬松.Snort 2.0 Intrusion Detection [M].北京:国防工业出版社,2004..
  • 7K Llgun,R A Kemmerer,P A Porras.State Transition Analysis:A Rule-based Intrusion Detection System[J].IEEE Transactions on Software Engineering,1995,21:181-199.
  • 8Xinyou Zhang,et al.Intrusion Prevention System Design[J].Computer and Information Technology,2004:386-390.
  • 9M C Bernardes,E S Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents[C].In:IEEE International Symposium on Software Engineering for Parallel and Distributed Systems,2000-06.
  • 10D Burroughs ,L Wilson ,G Cybenko. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods[C].In:Proceedings of IEEE International Performance Computing and Communications Conference, 2002-04.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部