期刊文献+

基于状态转换与漏洞扫描的入侵检测的研究 被引量:1

The Intrusion Detection System Based on the State Transition with Vulnerability Scanner
下载PDF
导出
摘要 通过对入侵检测的现状以及目前存在的问题进行深入的研究,提出了将入侵检测与漏洞扫描相结合的设计方案.该方法不仅能缩小知识库规模,有效缩短规则匹配时间,降低系统误报,而且还可实现知识库的动态更新.另一方面漏洞扫描系统也可以根据IDS传送的报警信息,对主机进行特定的扫描,针对发现的攻击,及时查找、修补相关安全漏洞.通过漏洞扫描与入侵检测系统的协作,可以有效地提高IDS的检测效率,增强系统的整体防御能力. A new c .ooporation mechanism between the intrusion detection system and vulnerability scanner is presented through in- depth researching about the existing problems of the intrusion detection. By this way, it will decrease the size of repository, the match time and the false Mann rate, in the mean time, it can update the repository dynamically. On the other hand, vulnerability scanner can start some special scanning to some host based on the Mann of intrusion detection system, aim at the detected intrusion and find the related vulnerahilitiee and patch them. By the cooperation between the vulnerability scanner and intrusion detection system, it can improve the efficient of intrusion detection system and enhance the defense of the system.
出处 《怀化学院学报》 2009年第8期54-56,共3页 Journal of Huaihua University
基金 福建农林大学计算机与信息学院校青年基金资助项目(07B21) 项目名称:基于状态转换的入侵检测
关键词 入侵检测系统 状态转换 漏洞扫描 intrusion detection system state transition vulnerability scanner
  • 相关文献

参考文献5

二级参考文献31

  • 1严玮.网络入侵检测与攻击防范[J].甘肃农业大学学报,2004,39(5):601-603. 被引量:3
  • 2邓琦皓,吕晓斌,罗军勇.基于入侵行为模式的告警关联[J].微计算机信息,2005,21(10X):8-10. 被引量:6
  • 3董斌,张少敏,王保义.基于Agent和STAT的入侵检测系统在电力信息系统的研究[J].电力自动化设备,2006,26(1):37-40. 被引量:3
  • 4Kumar G. Classification and detection of computer intrusion[D]. Indiana: Purdue University, 1995.
  • 5Denning D E. An Intrusion-Detection Model. IEEE Transactions on Software Engineering, 1987,SE-13 (2): 222~232
  • 6Escamilla T. Intrusion Detection: Network Security beyond the Firewall John Wiley & Sons, Inc, ISBN : 0471290009,1998. 1 ~15
  • 7Wespi A, Debar H. Building an Intrusion-Detection System to Detect Suspicious Process Behavior, Second International Workshop on the Recent Advances in Intrusion Detection,1999
  • 8Somayaji A, Forrest S. Automated Response Using Syst em-CallDelays, 9th USENIX Security Symposium, Aug. 2000
  • 9Kosoresow A P,Hofmeyr S A. Intrusion Detection via System Call Traces. IEEE Software,1997,14(5) :35~42
  • 10Forrest S,et al.A sense of self for Unix processes. In:Proc. of 1996 IEEE Symp. Security & Privacy. 120~128

共引文献10

同被引文献9

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部