期刊文献+

高速入侵检测研究 被引量:1

Research on intrusion detection system in high-speed network
下载PDF
导出
摘要 高速入侵检测是当前网络安全领域研究的热点之一,分析了高速环境下入侵检测面临的主要问题和各种制约因素,并对高速入侵检测的进行了多方面地研究,分析和介绍了零拷贝技术、快速匹配算法。分析指出基于分流的分布式入侵检测是高速检测的发展方向。最后给出高速入侵检测后续有待研究和解决的问题。 At present intrusion detection system (IDS) in high-speed network is a main point in security domain. The main problem and various restricted factors IDS faced in high-speed network is analyzed, and involved researches such as zero-copy technique and fast pattern matching model is introduced too. Finally, the distributed intrusion detection system based data-distribution is figured out as a good measure, and some remaining problems and emerging trends in this area is presented.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第14期3616-3619,3622,共5页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2003AA142060)
关键词 入侵检测 高速网 制约因素 零拷贝 快速匹配 分流 intrusion detection high-speed network restricted factors zero-copy fast pattern match data-distribution
  • 相关文献

参考文献15

  • 1Luca Deri,Passively monitoring networks at gigabit speeds using commodity hardware and open source soflware[C].Proceedings of PAM,2003:117-120.
  • 2McCreary S,Claffy K.Trends in wide area IP traffic pattems-a view from Ames Intemet.Exchange[C]. Monterey, US:Proceedings of ITC,2000:168-172.
  • 3Fraleigh, Moon, Lyles, et al. Packet-level traffic measurements from the sprint IP backbone[J].IEEE Network,2003,17(6):6-16.
  • 4Christopher Kruegel,Fredrik Valeur.Stateful intrusion detection for high-speed networks [C]. IEEE Computer Society,2002: 50- 53.
  • 5赖海光,黄皓,谢俊元.利用对称多处理器提高NIDS的性能[J].计算机应用,2005,25(5):1141-1144. 被引量:2
  • 6王胜航.Linux解决方案白皮书[EB/OL].http://www-900.ibm.com/cnJsupport/download/Linux_solution.pdf/2005-7-31.
  • 7Iheagwara C, Blyth A, Singhal M. A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment [J]. Journal of Computer Security, 2003,11 (1):1-33.
  • 8杨武,方滨兴,云晓春,张宏莉.入侵检测系统中高效模式匹配算法的研究[J].计算机工程,2004,30(13):92-94. 被引量:23
  • 9Markatos E. Exclusion-based signature matching for intrusion detection [C]. Cambridge, USA: International Conference on Communications and Computer Networks(CCN),2002:146-152.
  • 10王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67

二级参考文献47

  • 1黄铠 徐志伟.可扩展并行计算技术、结构与编程[M].北京:机械工业出版社,2000..
  • 2[1]RS Boyer, J S Moore. A fast string searching algorithm.Communications of ACM, 1977, 20(10): 762~772
  • 3[2]A Aho, M Corasick. Efficient string matching: An aid to biliographic search. Communications of ACM, 1975, 18(6): 333~ 340
  • 4[3]B Commentz-Walter. A string matching algorithm fast on average.In: H A Maurer ed. Proc of the 6th Int'l Colloquium on Automata, Languages, and Programming, LNCS 71. Berlin:Springer, 1979. 118~132
  • 5[5]E Ukkonen. On-line construction of suffix trees. Algorithmica,1995, 14(3): 249~260
  • 6[6]Bruce W Watson. The performance of single-keyword and multiple-keyword pattern matching algorithms. Eindhoven University of Technology, Eindhoven, the Netherlands, Tech Rep: 94/19, 1994
  • 7RUBINI A.等著 魏永明 骆刚 姜君译.LINUX设备驱动程序(第2版)[M].北京,中国电力出版社,2002..
  • 8White G.B.,Pooch U..Cooperating security managers:Distributed intrusion detection systems. Computers&Security,1996,15(5);441-450.
  • 9Basu A..Buch V.,Vogels W.,yon Eicken Thorsten.U-Net:A user-level network interface for parallel and distributed computing.In:Proceedings of the 15th ACM Symposium on Operating Systems Principles,Copper Mountain,Colorado,1995.
  • 10Welsh M.,Basu A.,yon Eicken T..Incorporating memory management into user-level network interfaces.Cornell University Ithaca,NY,USA:Technical Report TR97-1620,1997.

共引文献127

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部