期刊文献+

分布式漏洞扫描与入侵检测协作系统的研究 被引量:3

Distributed Intrusion Detection and Vulnerability Scanning System of Collaboration
下载PDF
导出
摘要 针对模式匹配方法的检测性能将随着网络规模的不断扩大而下降的现状,提出了分布式漏洞扫描与入侵检测系统协作机制,设计了系统模型,详细阐述了系统工作流程和数据库的设计方法与要点,实现了分布处理、结果准确、响应智能和安全性高的目标。 pattern matching methods of detection performance as the network will continue to expand and scale of the decline in the status quo, distributed by the vulnerability scanning and intrusion detection system coordination mechanism, the system design model, which detailed the work flow system and database The design elements and methods to achieve a distribution deal with, accurate, smart and safe response to the goal.
出处 《电脑与信息技术》 2008年第5期27-29,共3页 Computer and Information Technology
关键词 分布式 漏洞扫描 入侵检测 协作机制 distributed vulnerability scanning intrusion detection coordination mechanism
  • 相关文献

参考文献5

二级参考文献28

  • 1张连华,张冠华,郁郎,张洁,白英彩.Intrusion detection using rough set classification[J].Journal of Zhejiang University Science,2004,5(9):1076-1086. 被引量:16
  • 2王珊.数据仓库技术与联机分析处理[M] .[M].北京:科学出版社,1999..
  • 3[1]Wenke L, Salvatore S . Data Mining Approaches for lnrusion Detection. URL: http://www.cs.columbiaedu/~wenke/papers/usenix/ usenix.html, 2000-10-12
  • 4[2]Network Flight Recorder Inc.Network Flight Recorder http://www.nfr com
  • 5[3]Fayyad U , Piatetsky-Shapiro G , Smyth P . From Data Mining to Knowledge Discovery: An Overview. In Fayyad U . PiatetskyShapiro G , Smyth P, and Uthurusamy R, Editors, Adyances in Knowledge Discovery and Data Mining , AAAI/MIT Press,Cambridge, MA, 1996
  • 6[4]Lunt T. Detecting Intruders in Computer Systems. Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993
  • 7S R Snapp, S E Smaha, D M Teal et al. The DIDS (distributed intrusion detection system) prototype. In: USENIX Association.Proc of the Summer 1992 USENIX Conf. Berkeley, CA, USA:USENIX Association, 1992. 227--233.
  • 8S Staniford-Chen, S Cheung, R Crawford et al. GrlDS---A graph based intrusion detection system for large networks. The 19th National Information Systems Security Conference (NISSC),Baltimore, MD, USA, 1996. 1:361-370.
  • 9J S Balasubramaniyan, J O Garcia-Fernandez, D Lsaeoff et al.Architecture for intrusion detection using autonomous agents.COAST Laboratory, Purdue University, COAST Tech Rep: 98-05, 1998. http://www. cerias. purdue.edu/homes/aafid/docs/tr9805, pdf.
  • 10P A Porras, P G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. The 20th National Information Systems Security Conf(NISSC), Baltimore,MD, USA, 1997.353-365.

共引文献95

同被引文献9

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部