期刊文献+

基于回报期望的入侵检测系统性能评估

Evaluation of the IDS Capabilities Based on Return Expectations
下载PDF
导出
摘要 随着入侵检测技术和产品的发展,如何有效地评价入侵检测系统的有效性和可靠性成为了目前网络安全研究的一个热点问题。本文描述了目前入侵检测中一些常用的模型,对其优缺点进行了详细的描述。针对目前入侵检测系统的速度、准确率问题,结合入侵期望值模型,通过分析和推导给出了其值的最优参考值。给出了误报率、漏报率和入侵率与入侵个数乘积之间的关系,通过该关系可以得到入侵率与入侵个数乘积的值,其值对入侵检测系统的性能评估具有重要的意义。通过仿真实验验证了基于回报期望的入侵检测系统性能评估模型在入侵检测系统性能评估应用中的可行性。 It has become a hot topic in the current research of network security to evaluate the effectiveness and reliability of intrusion detection systems effectively with the development of technology and products of intrusion detection.This paper indicates the advantages and disadvantages of some intrusion detection models which are commonly used at present.An optimal reference value is given through analyzing and deriving an intrusion expectation model,which is different from the current problem of velocity and accuracy of the assessment of intrusion detection systems.Meanwhile,the relations of false alarm rate,false negative rate and the product of intrusion rate and intrusion number are given.Therefore,the product of intrusion rate and intrusion number can be given through the relation which is significant for the IDS capabilities evaluation.The feasibility of the return expectations-based IDS access model in assessing IDS is proved by the experiments of the Matlab software.
出处 《计算机工程与科学》 CSCD 北大核心 2011年第5期27-31,共5页 Computer Engineering & Science
基金 广东省自然科学基金资助项目(9151600301000001) 广东省科技计划资助项目(2009B010800026) 珠海市产学研资助项目(PC20082015) 茂名市科技计划重点资助项目(20091007)
关键词 误报率 漏报率 检测率 IDS 回报期望 false alarm rate false negative rate detection rate IDS return expectations
  • 相关文献

参考文献9

  • 1McHugh J. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System E- valuations as Performed by Lincoln Laboratory[J]. ACM Trans on Information and System Security, 2000,3(4):262- 294.
  • 2Lippmann R,Fried D,Graf I. Evaluating Intrusion Detection Systems: The 1998 DARPA Off- lane Intrusion Detection Evaluation[C]//Proc of the 2000 DARPA Information Sur- vivability Conf and Exposition, 2000:323- 325.
  • 3Phoenix. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods[C]//Proc of Performance, Compu- ting, and Communications Conf, 2002 : 329 -334.
  • 4Oaftney J E, Ulvila J W. Evaluation of Intrusion Detectors: A Decision Theory Approach[C]//Proc of the 2001 IEEE Symp on Security and Privacy, 2001:50- 61.
  • 5Ulvila J W, Gaffney J E. Evaluation of Intrusion Detection Systems[J]. Journal of Research of the National Institute of Standards and Technology,2003,108(6):453- 473.
  • 6Gu Guofei, Fogla P, Dagon D. An Information-Theoretic Measure of Intrusion Detection Capahility[R]. Technical Re- port GIT-CC-05-10 College of Computing, 2005.
  • 7Gu Guofei, Fogla P, Dagon D. Towards an Information- Theoretic Famework for AnaLyzing Intrusion Detection Sys- tems[C]//Proc of the 11th European Symp on Research in Computer Security, 2006:527 -546.
  • 8田俊峰,刘涛,陈小祥.入侵检测系统的评估方法与研究[J].计算机工程与应用,2008,44(9):113-117. 被引量:13
  • 9Gu Guofei, Fogla P. David Dagon Measuring Intrusion De- tection Capability: An lnformation Theoretic Approach[C] //Proc of ASIACCS'06, 2006:90-101.

二级参考文献17

  • 1董晓梅,肖珂,于戈.入侵检测系统评估技术研究[J].小型微型计算机系统,2005,26(4):568-571. 被引量:9
  • 2覃伯平,周贤伟,杨军,宋存义.基于模糊方法的综合评判入侵检测系统[J].计算机工程,2006,32(8):155-156. 被引量:7
  • 3Anderson J P.Computer security threat monitoring and surveillance [tUOL].James PAnderson Co.,Washington,Pennsylvania,1980.http:// seclab.cs.ucdavis.edu/projects/history/CD/ande80.pdf.
  • 4Puketza N,Zhang K,Chung M,et al.A methodology for testing intrusion detection systems[J].IEEE Transactions on Software Engineering, 1996,22(10) :719-729.
  • 5Puketza N,Chung M,Olsson R A,et al.A software platform for testing intrusion detection systems[J].IEEE Software, 1997,14(5). 43-51.
  • 6Durst R,Champion T,Witten B,et al.Testing and evaluating computer intrusion detection systems[J].Communications of the ACM, 1999,42(7) :53-61.
  • 7Lippmann R,Fried D,Graf I,et al.Evaluating intrusion detection systems:the 1998 DARPA Off-Line intrusion detection evaluation[C]// Proceedings of the 2000 DARPA Information Survivability Conference and Exposition,Hilton Head,IEEE,2000,2:323-325.
  • 8Lippmann R,Haines J,Fried D,et al.The 1999 DARPA Off-Line intrusion detection evaluation [J].Computer Networks, 2000,34 (4) : 579-595.
  • 9Lippmann R,Haines J,Fried D,et al.Analysis and results of the 1999 DARPA Off-Line: intrusion detection evaluation[C]//Computer Networks, 2000,34 : 579-595.
  • 10Graf I,Lippmann R,Cunningham R,et al.Resuhs of DARPA 1998 off-line intrusion detection evaluation[C]//DARPA PI Meeting, 15 December 1998.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部