期刊文献+

基于入侵防御系统的完备化规则库 被引量:1

Complete rule base of intrusion prevention system
下载PDF
导出
摘要 对于目前入侵防御系统(IPS)中规则库日益增大并且无法完备的特点,提出了一套完备化规则库系统。通过对网络操作行为的分解和对各种数据的挖掘,形成最基本最小的网络行为语言描述单元(网络行为描述DNA),再使用Teiresias进化算法对其进行全局遍历性的组合,计算产生新的描述语言,进行可行性判断后,对可行的结果进行规则匹配并进行风险评估,产生新的防御规则,从而达到入侵防御系统规则库完备的目的。 Regarding the characteristic that rule base of intrusion prevention system grows rapidly and is unable to complete,the paper proposes a complete rule base.Through the decomposition of network operation behavior and the data mining of various data,forms the most basic smallest unit of network operation behavior(DNA of network action description),uses the Teiresias evolution algorithm to carry on the overall situation ergodicity combination to produce the new description language.After the feasible judgment,carries on the rule base matching and the risk assessment,then produces the new defense rule,thus reaches the goal of completing the rule base of IPS.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第9期88-91,共4页 Computer Engineering and Applications
基金 河南省杰出人才创新基金(No.074200510013) 河南省教育厅自然科学基金(No.2007520048)。
关键词 入侵防御 规则库 完备化 网络行为描述DNA Teiresias算法 intrusion prevention rule base completely DNA of network behavior description Teiresias algorithm
  • 相关文献

参考文献8

  • 1PChung S,Mok A K.The LAIDS/LIDS framework for systematic IPS design[C]//Proceedings of 4th IEEE International Workshop on Information Assurance, IWIA, London, UK, Apr.13-14,2006: 3-11.
  • 2李健,顾国昌,张国印.基于代理技术的入侵防御系统研究[J].计算机工程与应用,2005,41(31):116-118. 被引量:4
  • 3Song Fuijun,Smith S M.A simple weight based fuzzy logic controller rule base reduction method[C]//Systems,Man, and Cybernetics,2000 IEEE International Conference on Volume 5,8-11 Oct. 2000: 3794-3799.
  • 4Hwang Kao-Shing,Ju Ming-Yi, Lin Jy-Hsin.Design of fuzzy controller with synthesized rule base[C]//Industrial Electronics,Control, and Instrumentation,Proceedings of the 1996 IEEE IECON 22nd International Conference on Vol 1,5-10 Aug, 1996.
  • 5Murata J,Ideta K, Hirasawa K.Automatic rule set modeling and change detection of systems[C]//Systems Man and Cybernetics.Computational Cybernetics and Simulation,1997 IEEE International Conference on Vol 4,12-15 Oct. 1997:3889-3894.
  • 6Floratos A,Rigoutsos I.The time complexity of the TEIRESIAS algorithm[EB/OL]. ( 1998 ).http://domino.watson.ibm.com/library.
  • 7陈蔚然,董守斌.基于生物序列模式提取技术的邮件过滤算法[J].清华大学学报(自然科学版),2005,45(S1):1734-1737. 被引量:3
  • 8Sebastlani F.Machine learning in automated text categorization[J]. ACM Computing Surveys, 2002,34 : 1-47.

二级参考文献16

  • 1林珊,宁国宁,赵之霖.中文分词在邮件过滤系统中的应用[J].华南理工大学学报(自然科学版),2004,32(z1):112-116. 被引量:3
  • 2刘萍萍,周求湛,徐昊,申铉京.混合型分布式入侵检测系统模型[J].吉林大学学报(工学版),2004,34(4):666-670. 被引量:6
  • 3M C Bernardes,E S Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents[C].In:IEEE International Symposium on Software Engineering for Parallel and Distributed Systems,2000-06.
  • 4D Burroughs ,L Wilson ,G Cybenko. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods[C].In:Proceedings of IEEE International Performance Computing and Communications Conference, 2002-04.
  • 5R S Gray,G Cybenko,D Kotz et al.D'Agents :Applications and performance of a mobile-agent system[J].Software :Practice and Exper, 2002; 32: 543~573.
  • 6W Jansen ,P Mell,T Karygiannis et al.Applying Mobile Agents to Intrusion Detection and Response. NIST IR-6416,1999-10.
  • 7C Krugel,T Toth. Applying Mobile Agent Technology to Intrusion Detection[C].In: 10th IEEE Workshop on Enabling Technologies :Infrastructure for Collaborative Enterprises,IEEE Computer Society Press, USA, 2001-06.
  • 8J Levine, R LaBella, H Owen et al.The Use of Honeypots to Detect Exploited Systems Across Large Enterprise Networks[C].In:Proceedings of the 2003 IEEE Workshop on Information Assurance,2003-06.
  • 9N Provos. Honeyd:A Virtual Honeypot Daemon(Extended Abstract)[C]. In: 10th DFN-CERT Workshop, Hamburg, Germany, 2003-02.
  • 10E H Spafford,D Zamboni.Intrusion detection using autonomous agents[J].Computer Network,2000;34(10) :547~570.

共引文献5

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部