期刊文献+

一种基于模糊聚类的新型入侵防御攻击系统模型

A New Intrusion Prevention and Attack System Model Based on Fuzzy Clustering
原文传递
导出
摘要 本文从降低传统入侵防御系统检测引擎的虚警率、漏警率与增强主动防御能力方面入手,给出了一种基于模糊聚类的入侵防御系统检测引擎实现方案;并探讨了将蜜罐技术与入侵防御系统相结合的可行性;进而提出了一个全新的入侵攻击防御系统模型。在这个模型中,入侵防御系统同时具有了实时防御与攻击防御的能力。 In order to reduce the false and missed alarm rates of detection engine in the traditional intrusion prevention system and enhance the active defense capabilities, an program based on fuzzy clustering implementations is given in this paper. Combined with the honey pot technology, a new intrusion prevention system model is established. In this model, the intrusion prevention system has got the ability of real- time defense and attack defense.
出处 《世界科技研究与发展》 CSCD 2010年第4期449-451,439,共4页 World Sci-Tech R&D
基金 辽宁工程技术大学科研立项(Y200900505)
关键词 蜜罐 蜜网 入侵防御系统 模糊聚类 honey pot honey net IPS fuzzy clustering
  • 相关文献

参考文献7

二级参考文献40

  • 1[1]B Krishnamurthy.Mohonk:Mobile honeypots to trace unwanted traffic early.The ACM SIGCOMM Workshop on Network Troubleshooting (NetT'04),Portland,Oregon,USA,2004
  • 2[2]The Honeynet Project.http://www.honeynet.org,2007
  • 3[3]N Provos.A virtual honeypot framework.The 13th USENIX Security Symposium,San Diego,CA,USA,2004
  • 4[4]Hassan Artail,Haidar Safa,Malek Sraj,et al.A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks.Computers & Security,Alexandria,VA,USA,2006
  • 5[5]Z Kuwatly,Masri M Sraj,H Artail.A dynamic honeypot design for intrusion detection.ACS/IEEE Int'l Conf on Pervasive Services (ICPS 2004),Beirut,Lebanon,2004
  • 6[6]Xuxian Jiang,Dongyan Xu,Yi-Min Wang.Collapsar:A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.Journal of Parallel and Distributed Computing,2006,66(9):1165-1180
  • 7[7]C Kreibich,J Crowcroft.Honeycomb:Creating intrusion detection signatures using honeypots.ACM SIGCOMM Computer Communication Review,2004,34(1):51-56
  • 8[8]Urjita Thakar.HoneyAnalyzer:Analysis and extraction of intrusion detection patterns & signatures using honeypot.The 2nd Int'l Conf on Innovations in Information Technology,Dubai,UAE,2005
  • 9[9]Yegneswaran,et al.An architecture for generating semantics-aware signatures.Usenix Security Symposium,Baltimore,MD,2005
  • 10[10]Riebach,Rathgeb,Tdtmann.Risk assessment of production networks using honeynets-some practical experience.In:LNCS 3339.Berlin:Springer,2005

共引文献576

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部