期刊文献+

入侵检测系统开发流程及功能设计 被引量:1

下载PDF
导出
摘要 网络安全系统入侵检测系统的系统开发前期设计,为后期的软件系统开发提供理论性的指导。系统结构功能包括数据捕获、数据分析、规则匹配、规则动作等四大环节,有效地对网络攻击进行识别、分析、防御。
作者 丁智勇
出处 《福建电脑》 2008年第11期132-133,共2页 Journal of Fujian Computer
  • 相关文献

参考文献2

二级参考文献12

  • 1[1]J P Anderson. Computer security threat monitoring and surveillance[R].Technical report. Fort Washington,Pennsylvania:James P Anderson Company, 1980.4
  • 2[2]Dorothy E Denning. An Intrusion-Detection ModeI[J].IEEE Transactions on Software Engineering, 1987.2; 13 (2): 222-232
  • 3[3]Teresa F Lunt,R Jagannathan,Rosanna Lee et al.IDES:The enhanced prototype,A real-time intrusion detection system[R].Technical Report SRI Project 4185-010,SRI-CSL-88-12,CSL SRI International,Computer Science Laboratory,SRI 1nt1.333 Ravenswood Ave.,Menlo Park,CA 94925-3493,UJSA, 1988.10
  • 4[4]D Anderson,T Frivold,A Valdes. Next-generation intrusion-detection expert system(NIDES)[R].Technical Report SRI-CSL-95-07,Computer Science Laboratory,SRI International,Menlo Park ,CA 94025-3493,USA, 1995.5
  • 5[5]Todd Heberlein,Gihan Dias,Karl Levitt et al.A network security monitor[C].In:Prnceedings of the 1990 IEEE Symposium on Research in Security and Privacy ,IEEE ,Los Alamitos ,CA ,USA :IEEE Computer Soo. Press, 1990: 296-304
  • 6[6]Mark Crosbie,Eugene H Spafford. Defending a Computer System Using Autonomous Agents[R].CSD-TR-95-022,Department of Computer Sciences, Purdue University, 1995
  • 7[7]S Staniford Chen,S Cheung,R Crawford et aI.GrIDS:A graph based intrusion detection system for large networks[C].In :Proceedings of the 19th National Information Systems Security Conference, 1996
  • 8[8]Gregory B White,Eric A Fisch,Udo W Pooch.Cooperating Security Managers:A Peer Based Intrusion Detection System[J].lEEE Network,1996; (1/2) :20~23
  • 9[9]Philip A Porras,Peter G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances[C].In :Proceedings of the 20th National Information Systems Security Conference,Baltimore,Maryland ,USA:National Institute of Standards and Technology/National Computer Security Center, 1997:353-365
  • 10[10]Robert Flood,Ewart Carson. Dealing with complexity-An introduction. to the theory and application of systems science[M].second elition,New York:Plenum Press, 1993:151-158

共引文献11

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部