期刊文献+

分布式蠕虫检测与主动防御系统的研究与实现 被引量:4

Research and implementation of distributed worm detection and active defense system
下载PDF
导出
摘要 以建立一个实时检测、主动防御网络蠕虫攻击的安全系统为目标,对蠕虫检测与主动防御技术进行了深入的研究,讨论了Aegis模型,探讨了利用snort进行蠕虫误用检测的研究思路和实现方法。仿真实验结果表明,Aegis系统具有良好的自适应性和开放式结构,有效地结合了蠕虫检测与主动防御技术,对蠕虫攻击具有高检测率和低误报率,并能及时有效的防范蠕虫危机。 A real-time detection and a active defense network worm attack safety system are established as a goal, the worm detection and the active defense technology are researched, the Aegis model, research mentality and the realization method on using snort to misuse detection the worm are discussed. The simulation experiment shows the Aegis system have good auto-adapted and the open style structure, effectively unified the worm detection and the active defense technology, had the high detection rate to the worm attack and lowly reporting mistakenly rate, and prompt effectively guard worm crisis.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第22期5735-5737,5747,共4页 Computer Engineering and Design
基金 湖南省高等学校科学研究基金项目(#07C033)
关键词 蠕虫检测 主动防御系统 蠕虫对抗 AEGIS SNORT worm detection active defense system worm resistance Aegis Snort
  • 相关文献

参考文献6

二级参考文献31

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2Jhan M Kamber著 范明 孟小峰等译.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 3LINGER R C, MEAD N R, LIPSON H F. Requirements definition for survivable network systems[A]. Requrements Engineering'98[C]. Colorado, 1998.14-23.
  • 4Understanding symantec's anti-virus strategy for internet gateways[EB/OL]. http://www. symantec.com/avcenter/reference/ wpnavieg.pdf. 1999.
  • 5CHEUNG S, HOAGLAND J, LEVITT K, et al. The Design of GrIDS: A Graph-Based Intrusion Detection System[R]. Technical Report CSE-99-2, U.C. Davis Computer Science Department, 1999.
  • 6Computer emergency response team(CERT)[EB/OL]. http://www.cert.org/advisories/.
  • 7STEVENS W R. TCP/IP Illustrated, Volume 1:The Protocols[M].USA: Addison Wesley, 1994.
  • 8CARLA T L, BRODLEY C E. Temporal sequence learning and data reduction for anomaly detection[A]. Proc of the 5th Conference on Computer and Communications Security[C]. New York,1999.
  • 9ROESCH M. Writing snort rules: how to write snort rules and keep your sanity[EB/OL]. http://www.snort.org.
  • 10R Agrawal, T Imielinski, A Swami. Mining association rules between sets of items in large databases. The ACM SIGMOD Int'l Conf Management of Data,Washington D C, 1993

共引文献282

同被引文献25

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部