期刊文献+

分布式无线入侵防御系统预先决策引擎研究 被引量:4

Research of Distributed Pre-Decision Engine in Wireless Intrusion Prevention Systems
下载PDF
导出
摘要 随着无线局域网的飞速发展,无线入侵防御系统正成为网络安全领域的研究热点。本文在分析无线局域网常见攻击方法的基础上,设计了一个分布式无线入侵防御系统预先决策引擎(distributed pre-decision engine,DPDE),能够有效地预测攻击者的入侵意图并提供主动的入侵防御。DPDE引擎采集无线设备信息,在规划识别中引入规划支持程度,扩展了入侵检测规则,并对攻击规划的推导过程进行了改进。实验测试表明,预先决策引擎不仅提升了无线入侵检测和防御的性能,还有效减少漏警和虚警的产生。 Nowadays wireless intrusion prevention systems have become the research hotspot with the fast development of WLAN.In this paper,we first introduce the common attack methods for WLAN,and then present the framework of the wireless IPS with a distributed pre-decision engine,which can predict the future actions and direct active responses to these actions.We implement an improved model with extended detection rules for conducting intrusion plan and making pre-decision,by gathering wireless device information and importing supporting degree of intrusion plan in plan recognition.Experimental results showed that the distributed pre-decision engine can not only improve wireless intrusion detection and prevention performance,also reduce false negatives and false positives evidently.
出处 《电信科学》 北大核心 2010年第10期80-86,共7页 Telecommunications Science
基金 浙江省自然科学基金资助项目(No.Y1080821)
关键词 入侵防御系统 规划识别 检测规则 网络安全 intrusion prevention system plan recognition detection rule network security
  • 相关文献

参考文献11

  • 1中国互联网络信息中心(CNNIC).第25次中国互联网络发展状况统计报告.2010-1.www.cnnic.net.cn.
  • 2Ken Hutchison. Wireless intrusion detection systems, http:// www.sans.org/rr/whitepapers/wireless/, 2005.
  • 3吴海燕,蒋东兴,程志锐,高国柱.入侵防御系统研究[J].计算机工程与设计,2007,28(24):5844-5846. 被引量:18
  • 4李庆超,邵志清.无线网络的安全架构与入侵检测的研究[J].计算机工程,2005,31(3):143-145. 被引量:16
  • 5Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee. The implementation of a proactive wireless intrusion detection system. In:The Fourth International Conference on Computer and Information Technology, Wuhan, China, 2004.
  • 6Henry Kautz. A formal theory of plan recognition.Rochester:University of Rochester, 1987.
  • 7龙小飞,冯雁,王瑞杰.网络入侵检测系统预先决策检测引擎研究[J].浙江大学学报(工学版),2006,40(10):1701-1704. 被引量:3
  • 8Guanlin Chen, Hui Yao, Zebing Wang. An intelligent WLAN intrusion prevention system based on signature detection and plan recognition. In: Proceedings of the Second International Conference on Future Networks(ICFN 2010), Sanya, 2010.
  • 9姜云飞,马 宁.一种基于规划知识图的规划识别算法[J].软件学报,2002,13(4):686-692. 被引量:32
  • 10Goldman R P, Geib C W. Plan recognition in intrusion detection systems. In: Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), Anaheim, 2001.

二级参考文献35

  • 1李成华,周培源,张新访.基于主机内核的混合型入侵防御系统的设计与实现技术[J].计算机应用与软件,2006,23(7):117-120. 被引量:4
  • 2Denning D.An Intrusion Detection Model.IEEE Transactions on Software Engineering, 1987.
  • 3Clifford Kahn,Phillip A Porras,Stuart Staniford-Chen et al.A Common Intrusion Detection Framework.1998.
  • 4Henry A,Kautz A.Formal theory of plan recognition[M].Rochester:University of Rochester, 1987.
  • 5Christopher W Geib,Robert P Goldman.Plan Recognition in Intrusion Detection Systems.Honeywell Labs 2000.
  • 6Number of incidents reported.http://www.cert.org/stats/.
  • 7IEEE Standard Committees. ANSI/IEEE Std 802.11, Part Ⅱ: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY)Specifications.http://www.cce.utep.edu/Faculty /webtyao/ee5 390/11a.pdf, 1999
  • 8Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report, Computer Science Department, University of New Mexico. http://citeseer. ist. psu.edu/context/65327/0 - 36k, 1990
  • 9Maltz D A, Broch J, Jetcheva J, et al. The Effects of On-demand Behavior in Routing Protocols for Multi-hop Wireless ad Networks. IEEE Journal on Selected Areas in Communications, 1999(8): 36-41
  • 10Miller S K. Facing the Challeuge of Wireless Secruity. IEEE Computer Magazine, 2001 ,(7): 16-18

共引文献70

同被引文献48

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部