期刊文献+

入侵检测协作检测模型的分析与评估 被引量:1

Analysis and evaluation of collaborative intrusion detection model
下载PDF
导出
摘要 目前,入侵检测系统(IDS)存在较高的误报率,这一直是困扰IDS用户的主要问题,而入侵检测系统主要有误用型和异常型两种检测技术,根据这两种检测技术各自的优点,以及它们的互补性,将两种检测技术结合起来的方案越来越多地应用于IDS。通过引入入侵检测能力,从理论上深刻解释了系统协作的必然性,提出了异常检测技术和误用检测技术相结合的IDS模型及其评估方法,降低了单纯使用某种入侵检测技术时产生的误报率,从而提高系统的安全性。 At present, Intrusion Detection System (IDS) has the high false positive rate, ant it has always been a major problem to the IDS user. IDS mainly has two detection technologies: misuse detection and anomaly detection. According to two detection technologies' benefits, as well as their complementary, the collaborative detection is increasingly applied to IDS. By introducing the intrusion detection capability in theory, this paper profoundly explained the necessity of collaborative system, proposed the collaborative IDS model combined anomaly detection with misuse detection and its evaluation method. This model had lower false positive rate than using only one intrusion detection technology, thereby improved the system's security.
作者 陈德强
出处 《计算机应用》 CSCD 北大核心 2010年第A01期109-111,116,共4页 journal of Computer Applications
基金 上海晨光计划科研专项基金资助项目(2008CG40) 上海高校选拔培养优秀青年教师科研专项基金资助项目(hzf09009)
关键词 入侵检测 入侵检测能力 异常检测 协作检测 intrusion detection intrusion detection capability anomalous detection collaborative detection
  • 相关文献

参考文献8

  • 1LIPPMANN R P, CUNNINGHAM R, FRIED D, et al. Results of the DARPA 1998 off-line intrusion detection evaluation[EB/OL]. [2009 - 10 -05]. http://www. raid-symposium, org/raid99/PAPERS/Lippmann_DARPA. pdf.
  • 2LIPPMANN R, HAINES J, FRIED D, et al. The 1999 DARPA offline intrusion detection evaluation [ J]. Computer Networks, 2000, 34(4) : 579 -595.
  • 3ULVILA J W, GAFFNEY J E. Evaluation of intrusion detection systems[ J]. Journal of Research of the National Institute of Standards and Technology, 2003, 108(6) : 453 -473.
  • 4GU GUOFEI, FOGLA P, DAGON D, et al. Measuring intrusion detection capability: An information-theoretic approach in proeeodings of ACM symposium on information[C]// Proeeodings of the 2006 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2006:90 - 101.
  • 5NONG Y, SYED M E, LI X Y, et al. Statistical process control for computer intrusion detection[J]. DARPA Information Survivability Conference and Exposition Anaheim, 2001, 1(1) : 3 - 14.
  • 6田俊峰,张喆,赵卫东.基于误用和异常技术相结合的入侵检测系统的设计与研究[J].电子与信息学报,2006,28(11):2162-2166. 被引量:23
  • 7GAFFNEY J E, ULVILA J W. Evaluation of intrusion detectors: A decision theory approach[C]//Proceedings of the 2001 IEEE Sym- posium on Security and Privacy. Washington, DC: IEEE Computer Society, 2001 : 50.
  • 8贾春福,陈德强.相对熵密度偏差在入侵检测模型中的应用[J].计算机工程与应用,2009,45(13):20-22. 被引量:1

二级参考文献13

  • 1Lee W,Xiang D.Information-theoretic measures for anomaly detectian[C]//Proceedings of the 2001 IEEE Symposium on Security and Privacy,May 2001.
  • 2Tan K,Maxion R.Determining the operational limits of an anomalybased intrusion detector[J].Selected Areas in Communications,2003,21(14):96-110.
  • 3Gray R M.Entropy and information theory[M].New York:Springer Verlag,1990:12-52.
  • 4Gu G,Fogla P,Dagon D,et al.Measuring intrusion detection capability:An information-theoretic approach[C]//Proceedings of ACM Symposium on Inform Action,Computer and Communications Security,Taipei,Taiwan,March 2006.
  • 5Gu G,Fagla P,Dagon D,et al.Towards an iuformation-theoretic framework for analyzing intrusion detection systems[C]//Proceedings of the 11th European Symposium on Research in Computer Security(ESORICS' 06),Hamburg,Germany,September 2006.
  • 6Wang W,Guan X H,Zhang X L.Modeling program behaviors by hidden Markov models for intrusion detection[C]//Proceedings of 2004 International Conference on Machine Learning and Cybernetics,2004,5 (26-29):2830-2835.
  • 7Fumio Mizoguchi.Anomaly Detection Using Visualization and Machine Learning.IEEE 9th International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises.Gaithersburg,Maryland:March 14-16,2000:165-170.
  • 8Shan Zheng,Chen Peng,Xu Ke,et al..A Network State Based Intrusion Detection Model.2001 International Conference on Computer Networks and Mobile Computing.Beijing,CHINA:October 16 -19,2001:481-486.
  • 9Koral Ilgun,Richard A.Kemmerer,Phillip A.Porras.State transition analysis:A rule-based intrusion detection approach.IEEE Trans.on Software Engineering,1995-3,21 (3):181-199.
  • 10Nittida Nuansri,Samar Singh,Tharam S.Dillon.A Process State-Transition Analysis and its Application to Intrusion Detection.15th Annual Computer Security Applications Conference.Phoenix,Arizona:December 06-10,1999:378-387.

共引文献22

同被引文献71

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部