期刊文献+

一种分布式智能网络入侵检测系统的设计与实现

Design and Implementation of a Distributed Intelligent Network Invasion Detection System
下载PDF
导出
摘要 针对日益增多的网络安全威胁,按照入侵检测系统的设计要求,分析和对比已有的分布式入侵检测系统结构,提出了一种分布式的智能网络入侵检测系统。该系统结合蜜罐技术和专家系统,实现了系统资源的动态管理和部署,具有一定的灵活性和安全性。 In response to the growing number of network security threats, this paper analyzes and compares the existing structure of distributed invasion detection system, and gives a new design based on the distributed intelligent network invasion detection system. The system integrates honeypot technology and expert system to manage and deploy the system resources dynamically. It possesses a certain flexibility and security.
作者 李天 翟学明
出处 《计算机与网络》 2009年第22期68-70,共3页 Computer & Network
基金 华北电力大学青年基金资助项目(200811021)
关键词 入侵检测系统 蜜罐 主动专家系统 IDS honeypot expert system
  • 相关文献

参考文献5

二级参考文献49

  • 1[1]B Krishnamurthy.Mohonk:Mobile honeypots to trace unwanted traffic early.The ACM SIGCOMM Workshop on Network Troubleshooting (NetT'04),Portland,Oregon,USA,2004
  • 2[2]The Honeynet Project.http://www.honeynet.org,2007
  • 3[3]N Provos.A virtual honeypot framework.The 13th USENIX Security Symposium,San Diego,CA,USA,2004
  • 4[4]Hassan Artail,Haidar Safa,Malek Sraj,et al.A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks.Computers & Security,Alexandria,VA,USA,2006
  • 5[5]Z Kuwatly,Masri M Sraj,H Artail.A dynamic honeypot design for intrusion detection.ACS/IEEE Int'l Conf on Pervasive Services (ICPS 2004),Beirut,Lebanon,2004
  • 6[6]Xuxian Jiang,Dongyan Xu,Yi-Min Wang.Collapsar:A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.Journal of Parallel and Distributed Computing,2006,66(9):1165-1180
  • 7[7]C Kreibich,J Crowcroft.Honeycomb:Creating intrusion detection signatures using honeypots.ACM SIGCOMM Computer Communication Review,2004,34(1):51-56
  • 8[8]Urjita Thakar.HoneyAnalyzer:Analysis and extraction of intrusion detection patterns & signatures using honeypot.The 2nd Int'l Conf on Innovations in Information Technology,Dubai,UAE,2005
  • 9[9]Yegneswaran,et al.An architecture for generating semantics-aware signatures.Usenix Security Symposium,Baltimore,MD,2005
  • 10[10]Riebach,Rathgeb,Tdtmann.Risk assessment of production networks using honeynets-some practical experience.In:LNCS 3339.Berlin:Springer,2005

共引文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部