期刊文献+

基于有效载荷的异常入侵检测技术研究 被引量:1

Research on anomaly detection system based on payload
下载PDF
导出
摘要 分析了目前入侵检测存在的问题,提出了一种基于有效载荷的异常入侵检测技术。该技术选取网络数据包有效载荷的位分布作为系统特征值,采用统计学中的马哈拉诺比斯距离作为区分合法访问与非法入侵的算法,降低了误报率,提高了检测精度。实验结果表明,该检测技术是有效的,具备一定的识别未知入侵的能力,可以实现实时高效的异常入侵检测。 A new anomaly intrusion detection method based on payload is proposed to improve the problems of anomaly detection.The method selected network payload as system feature and it took Mahalanobis distance as algorithm to detect new instrusions.Experiments show that this method is valid.It can detect new intrusion and work well as a real time.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第23期5348-5351,共4页 Computer Engineering and Design
关键词 入侵检测 异常检测 有效载荷 马哈拉诺比斯距离 误报率 intrusion detection anomaly detection payload Mahalanobis distance false positive rate
  • 相关文献

参考文献8

  • 1沈明玉,邱文庆.基于句法模式识别的异常入侵检测技术研究[J].合肥工业大学学报(自然科学版),2008,31(5):708-710. 被引量:2
  • 2Wang Ke,Stolfo S J.Anomalous payload-bases network instrusion detection [Z].RAID, SpringerLink,2004.
  • 3魏广科.基于异常的入侵检测技术浅析[J].计算机工程与设计,2005,26(1):107-109. 被引量:10
  • 4Krueger C, Toth T, Kirda E.Service specific anomaly detection for network intrusion detection [C]. Spain: Symposium on Applied Computing, 2002.
  • 5MIT LINCOLN LAB[EB/OL].http://www.ll.mit.edu/IST/idevalf index.html.
  • 6现代应用数学手册编委会.现代应用数学手册--概率统计与随即过程卷[M].北京:清华大学出版社,2002:366-373.
  • 7Martin Roesch,Chris Green.Snort users mannal[EB/OL].http:// www.snort.org/docs/writing_rules/.
  • 8Snort 2.0 protocol flow analyzer, sourcefire inc[EB/OL].http:// www.sourcefire.com,2003.

二级参考文献9

  • 1吴焱.入侵者检测[M].北京:电子工业出版社,1999..
  • 2Denning D E. An intrusion detection model [J]. IEEE Transactions on Software Engineering, 1987, 13 (2) : 222-232.
  • 3Forrest S, Hofmeyr S A, Somayaji A, et al. A sense of self for Unix processes[C]//Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1996 : 120-128.
  • 4Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models[C]// The 1999 IEEE Symposium on Security and Privacy. Oak land: IEEE Computer Society, 1999 : 133-144.
  • 5Kosoresow A P, Hofmeyr S A. Intrusion detection via system call traces[J]. IEEE Software, 1997,14(5) : 35-42.
  • 6Hofmeyr S A, Forrest S, Somayaji A. Intrusion detection using sequences of system calls [J]. Journal of Computer Security, 1998,6 (3): 151-180.
  • 7Eskin E, Lee W, Stolfo S J. Modeling system calls for intrusion detection with dynamic window sizes[C]//Proceedings of DARPA Information Survivability Conference Exposition Ⅱ,2001: 165-175.
  • 8Liao Y H, Vemuri V R. Use of k-Nearest Neighbor classifier for intrusion detection [J]. Computers & Security, 2002,21(5):439-448.
  • 9Forrest S. CERT synthethic sendmail data[EB/OL], http://www. cs. unto. edu/- immsec/data/synth-sm. html,1996.

共引文献10

同被引文献34

  • 1Patcha A,Park J M.An overview of anomaly detection techniques:existing solutions and latest technological trends[J].Computer Networks,2007,51 (12):3448-3470.
  • 2Lazarevic A,Kumar V,Srivastava J.Intrusion detection:a survey[M] //Managing Cyber Threats.Springer,2005:19-78.
  • 3Early J,Brodley C.Behavioral features for network anomaly detection[M] //Machine Learning and Data Mining for Computer Security.Springer,2006:107-124.
  • 4Mahoney M,Chan P K.PHAD:packet header anomaly detection for idemifying hostile network traffic[DB/OL].http://cs.fit.edu/~ mmahoney/paper3.pdf,2013-06-17.
  • 5Kotaiantis S,Kanellopoulos D,Pintelas P.Data preprocessing for supervised leaning[J].International Journal of Computer Science,2006 (1):111-117.
  • 6Garea-Teodoro P,Daz-Verdejo J,Macia-Fernandez G,et al.Anomaly-based network intrusion detection:techniques,systems and challenges[J].Computers&Security,2009,28 (1/2):18-28.
  • 7Damashek M.Gauging similarity with N-grams:language independent categorization of text[J].Science,1995,267:843-848.
  • 8Davis J J,Clark A J.Data preprocessing for anomaly based network intrusion detection:a review[J].Computers&Security,2011,30(6/7):353-375.
  • 9Lippmann R,Haines J W,Fried D J,et al.The 1999 DARPA off-line intrusion detection evaluation[J].Computer Networks,2000,34(4):579-595.
  • 10Ingham K,Inoue H.Comparing anomaly detection techniques for HTTP[M] //Recem Advances in Intrusion Detection.Springer,2007:42-62.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部