期刊文献+

蜜罐与免疫入侵检测系统联动模型设计

Design of Linkage Model of Honeypot and Immune Intrusion Detection System
下载PDF
导出
摘要 网络攻击手段的多样性和攻击行为的动态性,给网络安全防御带来了困难。在基于免疫危险理论的入侵检测系统基础上,结合蜜罐技术和重定向机制,提出一个蜜罐和免疫入侵检测系统联动模型。介绍该模型的功能模块构成,分析检测器和危险信号相关机制。与其他模型相比,该模型具有主动性、动态性和低漏报率等优点。 The multiplicity of the network attack method and the dynamic of the network aggressive behavior bring difficulties to network security defense.Presents a linkage model of honeypot and immune intrusion detection system based on immune danger theory intrusion detection system, combining the redirection mechanism and honeypot technology.Introduces the function modules in details and analyses some mechanisms related to the detector and the danger signal.Comparing with other intrusion detection system,this module has many advantages,such as initiative,dynamic,lower false positive rate and so on.
作者 李学宝
出处 《现代计算机》 2011年第4期77-80,共4页 Modern Computer
基金 内蒙古高等院校重点项目(No.NJ10162) 内蒙古自然科学基金资助项目(No.2010BS0904)
关键词 蜜罐 免疫危险理论 入侵检测系统 联动 Honeypot Immune Danger Theory Intrusion Detection System Linkage
  • 相关文献

参考文献10

  • 1U. Aickelin S. Cayer. The Danger Theory and Its Application to Artificial Immune System, Proceedings of the 1st Inter- national Conference on Artificial Immune Systems, 2002 [C]. University of Kent at Canterbury, 2002:141~148.
  • 2U Aickelin P Bentley. Danger Theory: the Link Between AIS and IDS. Proceedings ICARIS-2003, 2nd International Con- ference on Artificial Immune Systems,2003 [C]. Edinburgh, UK,2003 : 147~155.
  • 3Greensmith J,Aiekelin U and Twyeross J.Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detec- tion Systems,6th International Conference in Adaptive Com-puting in Design and Manufacture 2004[C].Bristol,UK,2004: 1-3.
  • 4atzinger P.Tolerance,Danger and the Extended Family [J]. Annu Rev Immunol, 1994,12 : 991-1045.
  • 5赵林惠,戴亚平,付东梅,董芳艳.基于危险模型的三级模块式入侵检测系统[J].计算机应用,2006,26(10):2310-2314. 被引量:4
  • 6黄晓涛,李莎.基于危险理论的多代理异常入侵检测研究[J].计算机仿真,2008,25(1):142-145. 被引量:10
  • 7王慧.基于危险理论的网络入侵检测系统研究[J].计算机仿真,2010,27(6):159-162. 被引量:13
  • 8P. Matzinger. The Danger Model:a Renewed Sense of Self[J]. Science 2002,vo1296:301-304.
  • 9S. Forrest, A. S. Perelson, L. Allen, R. Cherukuri. Self-Non- self Discrimination in a Computer, In Proc. of the 1994 IEEE Symposium on Research in Security and Privacy,pp. 202-212.
  • 10Stefan Axelsson. The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection, Proceedings of the 6th ACM Conference on Computer and Communications Se- curity,1999 [C]. New York, NY, USA ,1999:1-7.

二级参考文献22

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部