基于图表的入侵检测系统
摘要
分析一般入侵检测系统在可配置性,可伸缩性,效率等方面的弱点,提出一个基于图表的入侵检测系统,介绍基于图表的入侵检测的基本概念、构图引擎、组件通信模块、组件层次架构及模块控制器和软件控制器,指出进一步的研究工作。
参考文献2
-
1韩继红,王亚弟,汤光明.基于自主代理的入侵检测[J].计算机应用,2002,22(2):40-42. 被引量:2
-
2Staniford-Chen S,Cheung S,Crawford R,Dilger M,Frank J,Hoagland J,Levitt K,Wee C,et.al.The design of grids:a graph based intrusion detection system for large networks.[R]Technical Reports.UC Davis,1999.
二级参考文献12
-
1[1]S.M.Bellovin.Security problems in the TCP/IP protocol suite[J].Computer Communication Review, 1989,19(2):32-48.
-
2[2]R.Heady, G.Luger, A.Maccabe, et al.The architecture of a network level intrusion detection system[R].Technical Report, University of New Mexico, Department of Computer Science, August 1990.
-
3[3]B.Mukherjee, Todd L.Heberlein, Karl N.Levitt.Network Intrusion Detection[J].IEEE Network,,May/June 1994,8(3): 26-41.
-
4[4]Phil Porras, Dan Schnackenberg, Stuart Staniford-Chen.The Common Intrusion Detection Framework Architecture[EB/OL].http://www.gidos.org.
-
5[5]Thomas H.Ptacek, Timothy N.Newsham.Insertion, evation, anddenial of service: Eluding network[R].Technical report, Secure Networks, Inc., January 1998.
-
6[6]S.Staniford-Chen, S.Cheung, R.Crawford, et al.GrIDS: A graph based intrusion detection system for large networks[C].In Proceedings of the 19th National Information Systems Security Conference, volume 1.National Institute of Standards and Technology, October 1996.361-370.
-
7[7]Gregory B.White, Eric A.Fisch, Udo W.Pooch.Cooperating securitymanagers: A peer-based intrusion detection system[J].IEEE Network, January/February 1996:20-30.
-
8[8]Mark Crosbie, Gene Spafford.Defending a Computer System usingAutonomous Agents[R].COAST Technical Report No.95-022,March 1994.
-
9[9]Mark Crosbie, Gene Spafford.Active Defense of a Computer Systemusing Autonomous Agents[R].COAST Technical Report No.95-008, February 1995.
-
10[10]Jeffrey M.Bradshaw.An Introduction to software agents[M].AAAiPress/The Mit Press, 1997.
-
1博世包装推出全新Delta机器人控制平台[J].中国包装,2014,34(2):93-93.
-
2朱建芸.西门子进一步扩大其安全控制器产品阵容[J].轻工机械,2016,34(4):43-43.
-
3雅虎谷歌等网站逾200万密码遭黑客窃取[J].保密科学技术,2013,0(12):71-71.
-
4黄孙亮,陈建业.SDN变革[J].网络电信,2013,15(5):68-69.
-
5郭改枝,张鹏举.单片机控制液晶屏接口电路的设计与实现[J].内蒙古师范大学学报(自然科学汉文版),2010,39(4):425-427. 被引量:6
-
6王强.基于RTLinux的软件控制器[J].兵工自动化,2007,26(2):95-96.
-
7SIEMENS AUTOMATION和MATHWORKS在仿真与基于模型的设计方面展开协作[J].微型机与应用,2015,34(1):96-96.
-
8李利平,益斌,刘张超,楚万秀.基于C8051F020海水预处理模块测控系统设计[J].现代电子技术,2012,35(5):121-123.
-
9陈伟海,李翔,于守谦,王建华.平面并联机器人的轨迹控制与在线监控[J].北京航空航天大学学报,2008,34(3):299-303. 被引量:2
-
10晨晨.企业应用SDN的安全利弊[J].计算机与网络,2013,39(23):50-51.