期刊文献+

基于特征信息序列语法分析的入侵检测技术

Research on Intrusion Detection Based on Sequence of Characteristic Information
下载PDF
导出
摘要 针对滥用类入侵检测技术存在的不足,提出了基于特征信息序列语法分析的入侵检测技术。将同类型多种入侵用统一的文法描述,有效地避免了检测分析中盲目试探匹配过程及由此而产生的低效率问题。该技术总体上属于滥用检测技术的范畴,由于采用了可扩展的文法创建技术,使其具备一定的异常检测能力,因而兼备滥用检测和异常检测两类技术的优点,不仅能识别已知的入侵或攻击,对新出现的入侵也能及时发现。 Aiming at shortcomings of the present technologies, this paper offers a new intrusion- detection technology which is based on sequence of characteristic information syntax analysis. Unified grammar description with a variety of types of invasion is effective way to avoid blind testing and matching process of the detection analysis and resulting inefficiencies. The present intrusion - detection technologies based on sequence of characteristic information syntax analysis could be described as a misuse of the checking technology. However, the discussed technology, using the expandable grammarcreated teehnique, is equiped with an ability of abnormity deteetion, so it overcomes the shortcomings of both misuse checking technology and abnormity detection one, not only can identify known invasion or attack on the emerging invasion also discovered in a timely manner.
出处 《现代电子技术》 2009年第13期89-92,99,共5页 Modern Electronics Technique
关键词 入侵检测 特征信息序列 语法分析 属性文法 intrusion detection sequence of characteristic information syntax analysis attribute grammar
  • 相关文献

参考文献6

二级参考文献13

  • 1苗杰,邵品洪.IBM模式匹配算法研究[J].情报学报,1995,14(4):255-264. 被引量:3
  • 2[1]Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks[M].By the consultants of the Network Security Solutions Ltd. Front-line Information Security Team(FIST), 1998.12
  • 3[2]Abdelaziz Mounji.Languages and Tools for Rule-Based Ditributed Intrusion Detection.The degree of Doctor of Computer Science Department of Facultes University,Belgioum,1997.9
  • 4[3]Request For Comments 791,792,793
  • 5[4]Calvin Ko,George Fink,Karl Levitt. Automated Detection of vunerabilities in Privileged Programs by Execution Monitoring[M].Depet.of Computer Seience,Davice,University of California
  • 6[5]Karyn Piehnarczyk,Steve Weeber,Riehard Feingold. Unix Incident Guide:How to Detect an Intrusion[S].CIAC-2305 R.1
  • 7Boyer R S, Moore j, S. A fast string searching algorithm[ J]. Communications of the ACM, 1977,12:761 -772.
  • 8Hochberg J,Jackson K,Stallings C,et al.NAJIR: An Automated System for Detecting Network Intrusions andMisuse[].Computers and Security.1993
  • 9李静.字符串的模式匹配算法——基于KMP算法的讨论[J].青岛化工学院学报(自然科学版),2002,23(2):78-80. 被引量:14
  • 10田俊峰,黄建才,杜瑞忠,翟建强.高效的模式匹配算法研究[J].通信学报,2004,25(1):61-69. 被引量:12

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部