期刊文献+

入侵检测系统研究与探讨 被引量:4

Research and discussion on intrusion detection system
下载PDF
导出
摘要 随着计算机网络的飞速发展,信息安全越来越受到人们的重视。入侵检测技术是保证计算机网络安全的核心技术之一,在保护计算机安全方面起着越来越重要的作用。本文从入侵检测技术的基本概念和发展入手,对入侵检测系统模型和入侵检测过程进行了综述和研究,同时讨论了入侵检测系统面临的主要问题及今后的发展趋势。 With the rapid development of computer networks, more attention is paied on information security. Intrusion detection technology is one of the core technologies to ensure security of computer networks,and plays an increasingly important rode. In the paper, start with the basic concepts and development of intrusion detection technology ,then reviewed and researched intrusion detection system model and process of intrusion detection , and at last, discussed the main problem of intrusion detection system and its trend for the future.
作者 刘从军 马骏
出处 《微计算机信息》 2009年第24期52-54,70,共4页 Control & Automation
关键词 入侵检测 入侵检测系统 IDES DIDS Intrusion Detection Intrusion Detection System IDES DIDS
  • 相关文献

参考文献12

  • 1Anderson J P. Computer Security Threat Monitoring and Surveillance [R].James P Anderson Company, Fort Washington, Pennsylvania, April 1980.
  • 2Dorothy E. Denning, an intrusion-detection model [J].IEEE Transactions on Software Engineering,1987,13(2):222-232.
  • 3Steven E, Smaha. Haystack: an intrusion detection system[A]. Proceedings of the Fourth Aerospace Computer SecurityApplications Conference [C]. Washington: IEEE Computer Society Press, 1988.37-44.
  • 4Heady R, Luger G, Maccabe A. The Architecture of a Network Level Intrusion Detection System[R].Department of Computer Science, University of New Mexico, 1990.
  • 5Carla T L, Brodley E. Temporal sequence learning and data reduction for anomaly detection[A].Proeeedings of the 5th Conference on Computer & Communications Security [C]. New York: ACM Press,1998:150-158.
  • 6Carla T L, Broadley E. Detecting the Abnormal: Machine Learning In Computer Security[R].Technical Report TR-ECE 97-1,Purdue University, West Lafayette,1997.
  • 7Teng H S,Chen K,Lu S C. Adaptive real-time anomaly detection using inductively generated sequential patterns [A]. Proceedings of the IEEE Symposium On Research in Security and Privacy[C].Oakland CA,1990,12(4):278-284.
  • 8Kumar S. Classification and Detection of Computer Intrusions [D]. Dissertation, Purdue University,1995.
  • 9Ilgun K.USTAT: A Real-Time Intrusion Detection System for UNIX [D].Computer Science Department, University of California Santa Barbara,1992.
  • 10卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234

二级参考文献62

  • 1张海芹,须文波.基于移动Agent的新型分布式入侵检测系统[J].微计算机信息,2006,22(08X):76-77. 被引量:8
  • 2Zhang Y, Lee W. Intrusion detection in wireless Ad-Hoc net- works. In Proceedings of the Sixth Annual International Conference on Mobile Communication and Networking, ACM Press New York, USA, 2001:275-283.
  • 3Perkins C.Addison-Wesley,DSDV:Routing over a muhihop wireless network of mobile computers,Reading, MA,2003:88-91.
  • 4孙军帅.网络入侵检测系统研究.http://219.246.131.5/kns50.
  • 5A.W. Krings, W.S. Harrison, N. Hanebutte, C. Taylor, and M. McQueen. A Two-Layer Approach to Strrvivability of Networked Computing Systems, http://www.cs.uidaho.edu/krings.
  • 6HANJia-wei KAMBERM 范明 孟小辉译.数据挖掘概念与技术[M].北京:机械工业出版社,2003..
  • 7LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 8LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 9KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 10LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.

共引文献243

同被引文献81

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部