期刊文献+

入侵检测技术浅析 被引量:4

A Perception on Intrusion Detection Technology
下载PDF
导出
摘要 随着互联网技术的迅速发展,网络攻击和入侵事件与日俱增,入侵检测系统被认为是继防火墙之后的第二道网络安全闸门。本文介绍了入侵检测系统的基本概念、模型及分类,阐述了入侵检测系统的分析过程和部署,展望了入侵检测的未来发展趋势。 With the rapid development of Internet technology, the amount of network attacks and intrusions rises. Intrusion detection system is regarded as the second safe gate after firewall. This article introduces the basic concept, model and division of intrusion detection system, and then describes the analysis procedure and deployment of intrusion detection system, and looks forward to the future trend of intrusion detection technology in the end.
作者 杨栩燊
出处 《电脑与电信》 2009年第7期67-68,共2页 Computer & Telecommunication
关键词 入侵检测 网络安全 计算机网络 intrusion detection network security computer network
  • 相关文献

参考文献2

二级参考文献46

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献281

同被引文献13

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部