期刊文献+

基于蜜罐技术的分布式容侵防御模型

Distributed Intrusion Tolerance Resisting Model Based on Honey Pot Technology
下载PDF
导出
摘要 在分析国内外研究现状的基础上,针对目前蜜罐技术应用中存在的问题,提出了一种基于蜜罐的分布式容侵防御模型,并在模型中设计权限状态监控和基于匹配度的检测算法。测试实验证明,该模型能够弥补当前蜜罐技术应用的不足,辅助IDS提高威胁检测的准确度,有效地增强网络的容侵能力和生存能力。 On the basis of domestic and overseas research,the article puts forward a distributed intrusion tolerance resisting model based on honey pot according to problems existing in the current application of honey pot technology,and designs authority status monitoring and detection algorithm based on matching in the model.Test experiment proves that the model can make up the deficiency in the application of honey pot technology,enhance the accuracy of threat detection of IDS,and effectively lift the intrusion tolerance capacity and existence capacity of network effectively.
作者 张晓丽
出处 《西安航空技术高等专科学校学报》 2011年第3期70-73,共4页 Journal of Xi'an Aerotechnical College
基金 陕西省自然科学基金项目(07JK339)
关键词 蜜罐 分布式 容侵防御 匹配度 honey pot distribution intrusion tolerance resisting matching
  • 相关文献

参考文献5

  • 1Neil C Rowe,Mikhail Auguston,Doron Drusinsky,et al.Research on Deception in Defense of Information System[EB/OL].http://www.dodccrp.org/events/2004/.CCRTS_San_Diego/CD/papers/071.pdf,2004.
  • 2Spitzner L.Problems and Challenges with Honeypots[EB/OL].http://www.tracking-hackers.com/papers/honeypots.html,2004.
  • 3汪洁,王建新,唐勇.分布式虚拟陷阱网络系统的设计与实现[J].计算机工程,2006,32(18):163-165. 被引量:4
  • 4夏春和,李肖坚,赵沁平.基于入侵诱骗的网络动态防御研究[J].计算机学报,2004,27(12):1585-1592. 被引量:6
  • 5Haines JW,Lippmann RP,Fried DJ,et al.1999 DARPA Intrusion Detection System Evaluation:Design and Procedures[C]// MIT Lincoln laboratory Technical Report,USA:Massachusetts,2001:1062.

二级参考文献21

  • 1Hu Chang-Zhen. Research on network intrusion detection false fault. In: Proceedings of the 3th Research and Discussion of China Information Security Development and Stratagem, Beijing, 2003(in Chinese)(胡昌振.网络入侵检测误警问题研究.见:第3届中国信息安全发展趋势与战略高层研讨会文集,北京,2003)
  • 2Tang Zheng-Jun. Design and implement of Network intrusion system. Beijing: Publish House of Electronics Industry, 2002(in Chinese)(唐正军等编.网络入侵检测系统的设计与实现. 北京:电子工业工业出版社,2002)
  • 3Frank J.. Machine learning and intrusion detection: Current and future directions. In: Proceedings of the 17th National Computer Security Conference, 1994. http://seclab.cs.ucdavis.edu/papers/ncsc.94.ps
  • 4Kumar Sandeep. Classification and detection of computer intrusions[Ph.D. dissertation]. Purdue University, 1995
  • 5http://www.cs.ucsb.edu/kemm/NetSTAT/documents.html
  • 6Warrender Christina, Forrest Stephanie, Pearlmutter Barak. Detecting intrusions using system calls: Alternative data models. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, USA, 1998, 133~145
  • 7USTAT November. A Real-time Intrusion Detection System for UNIX. http://www.cs.ucsb.edu/TRs/techreports/TRCS93-26.ps, 1992
  • 8Ilgun Koral. Ustat: A real-time intrusion detection system for unix. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, USA, 1992, 16~40
  • 9Anderson Debra, Lunt Teresa F., Javitz Harold, Tamaru Ann, Valdes Alfonso. Detecting unusual program behavior using the statistical component of the next-generation expert system(NIDES). Computer Science Laboratory, SRI International, Menlo Park, CA, USA: Technical Report SRI-CSL-95-06, 1995
  • 10Lunt T.F., Tamaru A., Gilham F. et al.. A Real-time intrusion detection expert system(IDES). Computer Science Laboratory SRI International, Menlo Park, California: Technical Report, 1992

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部