期刊文献+

基于协议分析的入侵检测系统

Intrusion Detection System Based On Protocol Analysis
下载PDF
导出
摘要 入侵检测技术是安全防护的重要手段,而基于协议分析的入侵检测已经成为下一代入侵检测系统的关键技术之一。本文在分析网络入侵检测系统结构和传统的特征模式匹配技术的基础上,对协议分析的内容和过程进行了阐述,给出了基于协议分析的入侵检测系统的模型。并且分析基于模式匹配的入侵检测系统的不足,提出将模式匹配与协议分析相结合的方法。 Intrusion detection technique is an important safety precaution, meanwhile intrusion detection based on protocol has become one of the key technologies for the intrusion system detection of the next generation. The paper-based on the analysis of network intrusion detection's structure and traditional character pattern matching technology, explains the content and process of protocol analysis, based on protocol analysis, proposes a model of intrusion detection system. Furthermore,analyzes the limitations of intrusion detection system which is based on pattern matching, puts forward a method which protocol analysis and pattern matching are combined.
机构地区 上海海洋大学
出处 《微计算机信息》 2010年第27期51-53,共3页 Control & Automation
关键词 入侵检测系统 模式匹配 协议分析 Intrusion Detection Pattern Match Protocol Analysis
  • 相关文献

参考文献3

二级参考文献20

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2王勇 王一川 林花军等译.GNU/Linux 编程指南[M].北京:清华大学出版社,2000..
  • 3Anderson J P. Computer Security Threat Monitoring and Surveillance [R].James P Anderson Company, Fort Washington, Pennsylvania, April 1980.
  • 4Dorothy E. Denning, an intrusion-detection model [J].IEEE Transactions on Software Engineering,1987,13(2):222-232.
  • 5Steven E, Smaha. Haystack: an intrusion detection system[A]. Proceedings of the Fourth Aerospace Computer SecurityApplications Conference [C]. Washington: IEEE Computer Society Press, 1988.37-44.
  • 6Heady R, Luger G, Maccabe A. The Architecture of a Network Level Intrusion Detection System[R].Department of Computer Science, University of New Mexico, 1990.
  • 7Carla T L, Brodley E. Temporal sequence learning and data reduction for anomaly detection[A].Proeeedings of the 5th Conference on Computer & Communications Security [C]. New York: ACM Press,1998:150-158.
  • 8Carla T L, Broadley E. Detecting the Abnormal: Machine Learning In Computer Security[R].Technical Report TR-ECE 97-1,Purdue University, West Lafayette,1997.
  • 9Teng H S,Chen K,Lu S C. Adaptive real-time anomaly detection using inductively generated sequential patterns [A]. Proceedings of the IEEE Symposium On Research in Security and Privacy[C].Oakland CA,1990,12(4):278-284.
  • 10Kumar S. Classification and Detection of Computer Intrusions [D]. Dissertation, Purdue University,1995.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部