期刊文献+

一种入侵检测实验系统的设计与实现 被引量:1

An Implementation of Intrusion Detection Experiment System
下载PDF
导出
摘要 针对专业教学过程中理论内容较难理解和接受的情况,设计了一种入侵检测的实验系统,实现对网络嗅探和端口扫描两种类型的入侵进行检测。针对网络中的嗅探攻击,利用WinPcap网络开发包,实现基于ARP报文探测的嗅探攻击的演示。此外,实验系统还针对网络中的TCP端口扫描攻击,利用Libnids网络开发包,实现了基于统计阈值检测法的TCP端口扫描攻击的演示。最终通过短消息模块实现相应入侵行为的短信通知。 In view of the situation that content of the theory is difficult to understand and accept in the process of teaching professional lesson,an intrusion detection experiment system is implemented,which is realized in two kinds of intrusion detection,such as network sniffer and port scan.Using the WinPcap network development kit,and based on the ARP packet detection,the system demonstrates how the sniffer attacks work in the network.Using the Libnids network development kit,and based on the detection method of statistical threshold,the system also demonstrates how the TCP port-scans attack in the network.As being attacked,a corresponding notification could be sent to the manager through SMS modules.
出处 《计算机教育》 2010年第6期154-157,96,共5页 Computer Education
基金 南京邮电大学教学改革研究项目(JG00407JX22)
关键词 入侵检测 实验系统 网络嗅探 端口扫描 intrusion detection experiment system network sniffer port scan
  • 相关文献

参考文献5

  • 1W. Yan, E. Hou, N. Ansari. Description Logics for an Autonomic IDS Event Analysis System [J]. Computer Communicat ions, 2006,29 (15) : 2841-2852.
  • 2孙云,黄皓.一种混合式网络入侵检测系统[J].计算机工程,2008,34(9):164-166. 被引量:4
  • 3Vasilios Katos. Network Intrusion Detection: Evaluating Cluster, Discriminant, and Logit Analysis [J]. Information Sciences, 2007, 177 (15) : 3060-3073.
  • 4左晶,段海新,于雪莉.入侵检测系统中报警验证模块的设计与实现[J].计算机工程,2008,34(2):267-269. 被引量:5
  • 5王陈章.网络信息安全教学实验系统[D].长春:吉林大学计算机科学与技术学院,2008.

二级参考文献12

  • 1段海新,于雪丽,王兰佳.基于地址关联图的分布式IDS报警关联算法[J].大连理工大学学报,2005,45(z1):126-131. 被引量:4
  • 2Ptacek T H, Newsham T N. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection[Z]. Secure Networks Inc., 1998.
  • 3Kruegel C, Robertson W. Alert Verification: Determining the Success of Intrusion Attempts[C]//Proceedings of the 1st Workshop on Detection of Intrusions and Malware & Vulnerability Assessment. Germany: [s. n.], 2004-07.
  • 4Ning Peng, Cui Yun. An Intrusion Alert Correlator Based on Prerequisites of Intrusions[R]. Department of Computer Science, North Carolina State University of Erlangen, Technical Report: TR-2002-01, 2002-01.
  • 5Porras P A, Fong M W, Valdes A, A Mission Impact Based Approach to INFOSEC Alarm Correlation[C]//Proceedings of the 5th International Symposium on Recent Advances in Intrusion Dtetection. Zurich: [s. n.], 2002-10.
  • 6Real-time Network Awareness[DB/OL]. [2006-12-21]. http://www. sourcefire.com/technology/whitepapers.html.
  • 7Ramesh S, Elango K. Reducing False Positives Using Vulnerability Assessment[DB/OL]. [2006-12-21]. http://www.securitydocs. com/library/2563/library/2563.
  • 8Verwoerd T,Hunt R.Intrusion Detection Techniques and Approaches[J].Computer Communications,2002,25(15):1356-1365.
  • 9Roesch M.Snort-lightweight Intrusion Detection for Networks[C]//Proc.of the 13th Conf.on Systems Administration.Washington,D.C.,USA:[s.n.],1999:229-238.
  • 10Wang Ke,Stolfo S J.Anomalous Payload-based Network Intrusion Detection[C]//Proc.of the 7th International Symposium on Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2004:203-222.

共引文献7

同被引文献14

  • 1何增颖,陈建锐.入侵检测系统测试实验设计与实现[J].实验室研究与探索,2010,29(3):80-82. 被引量:3
  • 2ACM KDD CUP[Online].www.sigkdd.org/kdd-cup-1999-computer-network-intrusion-detection..
  • 3孙艺峻,张宏莉,何慧.大规模网络安全态势分析中的报警关联规则挖掘[C]//2007年全国网络与信息安全研讨会论文集,2007.
  • 4刘建军.基于Hadoop的WEB入侵检测分析[C]//2014第十九届全国青年通信学术年会论文集,2014.
  • 5Mohammed Nazim Feroz,Susan Mengel.Examination of Data,Rule Generation and Detection of Phishing URLs using Online Logistic Regression[C]//2014 IEEE International Conference on Big Data,2014.
  • 6Jakrarin Therdphapiyanak,Krerk Piromsopa.An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework[C]//2013 10thInt Conf on Electrical Engineering/Electronics,Computer,Telecommunications and Information Technology(ECTI-CON).2013.
  • 7overview-Apache mahout-Apache software foundation[Online].https://cwiki.apache.org/confluence/display/MAHOUT/Overview.
  • 8高峥,陈蜀宇,李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,20(6):148-151. 被引量:7
  • 9张新有,曾华燊,贾磊.入侵检测数据集KDD CUP99研究[J].计算机工程与设计,2010,31(22):4809-4812. 被引量:121
  • 10魏德志,吴旭,林丽娜,王奇光.基于云计算的模糊规则挖掘算法在入侵检测中的应用[J].吉林师范大学学报(自然科学版),2012,33(1):115-118. 被引量:7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部