期刊文献+

基于环境模拟的入侵检测系统测试方法 被引量:3

Method for Intrusion Detection System Based on Environment Simulation
下载PDF
导出
摘要 入侵检测系统(IDS)已经成为保障网络安全不可缺少的环节,对IDS的评估和测试是验证IDS系统有效性的必要手段。讨论了入侵检测系统测试的目的和测试的性能指标,基于对现实网络环境的模拟,建立测试环境,并在此测试环境中搭建软件测试平台,阐述了对入侵检测系统进行测试的方法,最后结合实验给出了仿真测试的结果。 The Intrusion Detection System (IDS) has already become a very important part in network security. It is need to solve the problem of evaluating and verifying IDS. In this article, the purpose and performance of IDS are discussed, environment is built by simulating a true network environment,and based on this testing environment creating software testing platform,using this testing environment and this testing platform can test IDSs,simulation testing results are given.
出处 《现代电子技术》 2009年第17期66-69,共4页 Modern Electronics Technique
关键词 入侵检测系统 测试环境 测试平台 环境模拟 intrusion detection system testing environment testing platform environment simulation
  • 相关文献

参考文献8

  • 1Char Sample, Mike Nickle, Ian Poynter. Firewall And IDS Shortcomings[R]. SANS Network Security, Monterey,California, 2000.
  • 2林果园,黄皓,张永平.入侵检测系统研究进展[J].计算机科学,2008,35(2):69-74. 被引量:26
  • 3Richard Lippmann. 1998 DARPA Intrusion Detection Evaluation Plans: Part Ⅰ[R]. MIT Lincoln Laboratory, 1998.
  • 4Hains J W,Richard Lippmann. 1999 DARPA Intrusion Detection Evaluation:Design and Procedures[R]. MIT Lincoln Laboratory, 2001.
  • 5Dominique Alessandri. Using Rule - based Activity Descriptions to Evaluation Intrusion - Detection System[R]. Switzerland, IBM Research Laboratory, 1999.
  • 6Peter Mell. An Overview of Issues in Testing Intrusion Detection Systems[R]. NIST Release of NIST Interagency Report (NISTIR) 7007,2003.
  • 7徐明,陈纯,应晶.基于系统调用分类的异常检测(英文)[J].软件学报,2004,15(3):391-403. 被引量:27
  • 8Cardenas A,J Baras S,Seamon K. A Framework for the Evaluation of Intrusion Detection Systems[A]. Procecdings of the 2006 IEEE Symposium on Security and Privacy[C]. Oakland, 2006 : 63 - 77.

二级参考文献24

  • 1张相锋,孙玉芳,赵庆松.基于系统调用子集的入侵检测[J].电子学报,2004,32(8):1338-1341. 被引量:10
  • 2姚羽,高福祥,于戈.基于混沌神经元的延时滥用入侵检测模型[J].电子学报,2004,32(8):1370-1373. 被引量:4
  • 3王丽娜,徐巍,刘铸.基于相似度聚类分析方法的异常入侵检测系统的模型及实现[J].小型微型计算机系统,2004,25(7):1333-1336. 被引量:16
  • 4钱德沛,张然,白跃彬.一种基于UML的协同入侵检测系统分析方法[J].北京航空航天大学学报,2004,30(9):803-807. 被引量:2
  • 5Debar H, Dacier M, Wespi A. Toward a taxonomy of intrusion-detection systems. Computer Networks, 1999,31(8):805-822.
  • 6Ye N, Li XY, Chen Q, Emran SM, Xu MM. Probabilistic techniques for intrusion detection based on computer audit data IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans, 2001,31(4):266-274.
  • 7Ko C, Fink G, Levitt K. Automated detection of vulnerabilities in privileged programs byexecution monitoring. In: Proc. of the 10th Annual Computer Security Applications Conf Orlando: IEEE Computer Society Press 1994. 134~144.
  • 8Bernaschi M, Gabrielli E, Mancini LV. REMUS: A security-enhanced operating system. ACM Trans. on Information and System Security, 2002,5(1):36-61.
  • 9Goldberg I, Waqner D, Thomas R, Brewer EA. A secure environment for untrusted helper applications. In: Proc. of the 6th USENIX UNIX Security Symp San Jose: USENIX, 1996. 1-13.
  • 10Marty R. Snort-Lightweight intrusion detection for networks In: Proc. of the 13th Conf. on Systems Administration. Washington:USENIX, 1999.229-238.

共引文献51

同被引文献25

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部