期刊文献+

IDS在研究所网络化中的设计与应用 被引量:1

Network-based IDS in the Institute of Design and Application
下载PDF
导出
摘要 随着计算机技术的发展,计算机网络给人们带来极大便利的同时,也带来了网络入侵等安全问题的威胁。文章讲述了入侵检测技术,分析了各种入侵检测过程及IDS的作用,并应用P2DR"动态安全模型"对某研究所的网络信息安全系统进行了初步的设计。 With the development of computer technology, computer networks brings a great convenience, but also brought the issue of network intrusion and other security threats. The article on intrusion detection technology to analyze a variety of intrusion detection process and the role of IDS, and application of P2DR "dynamic security model" of a research institute of network information security system for a preliminary design.
机构地区 [ [
出处 《计算机与数字工程》 2009年第12期105-107,111,共4页 Computer & Digital Engineering
关键词 入侵检测系统 网络安全 研究所网络化 intrusion detection system, network security, institute network
  • 相关文献

参考文献8

二级参考文献45

  • 1杜建国,郭巧.协议分析和命令解析在入侵检测中的应用[J].计算机工程与应用,2004,40(18):159-162. 被引量:13
  • 2蒋天发 余启港 等.计算机网络通信中信息安全保密技术[J].电化教育研究,1997,(12):96-100.
  • 3Anderson J P. Computer Security Threat Monitoring and Surveillance[ R], Technical report, Jamed P Anderson Co.1980.
  • 4Denning D E. An Intrusion Detection Model[J]. IEEE Transaction on Software Engineering, 1987,13(2) :222 - 232.
  • 5COMER D, SETHI R. The complexity of tile index construction[ J ]. ACM, 1977,24 (3) : 428 - 440.
  • 6Ye Nong, Vilbert S, Chert Qiang. Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data[J]. IEEE Transactions on Reliability,2003,52( 1 ):28- 32.
  • 7Agrawal R, Imielinaki T, Swami A. Mining association rules between sets of items in large database[A]. In: Proc 1993 ACM SIGMOD International ConI on Management of Data[C]. Washington, DC: [s. n. ], 1993. 207 - 216.
  • 8[1]D E Denning. An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2) :222-2
  • 9[2]G Vigna,R A Kemmerer. NetSTAT:A Network-based Intrusion Detection Approach[C].Proceedings of the 14th Annual Computer Security Conference,Scottsdale,Arizona, 1998.12
  • 10[3]S Kumar. Classification and Detection of Computer Intrusions[D].PhD Dissertation. Department of Computer Sciences,PurdueUniversity,1995

共引文献94

同被引文献5

  • 1Anderson J P.Computer security thread monitoring and surveillance[R].Fort Washington,PA: Jame P Anderson Co, 1980.
  • 2Denning D E.An intrusion--detection model[J].IEEE Transaction on Software Engineering, 1987, SE- 15 : 222-232.
  • 3Kumar, S. and E. Spafford.'A software architecture to support misuse intrusion detection." In Proceedings of the 18th National Information Security Conference, 194-204, 1995.
  • 4米金良.入侵检测技术及其应用.西安建筑科枝大学,2003.4.
  • 5张国华,肖频.一种基于网络的入侵检测系统设计[J].微计算机信息,2009,25(6):70-72. 被引量:11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部