期刊文献+

Honey-pot技术在校园网入侵检测系统中的应用 被引量:1

下载PDF
导出
摘要 黑客利用系统漏洞、ARP欺骗、非授权用户访问等攻击技术对校园网开展攻击的行为日益增多,传统的网络入侵检测系统所采取的是一种比较被动的防御方法,系统的检测能力较低。通过分析黑客攻击蜜罐的行为,从中提取攻击特征码到入侵检测系统的检测库,来提升校园网入侵检测系统的检测能力。
作者 边林洁
机构地区 浙江工业大学
出处 《信息系统工程》 2011年第6期67-68,共2页
  • 相关文献

参考文献5

二级参考文献10

  • 1《计算机工程与应用》2005年(第41卷)总目次[J].计算机工程与应用,2005,41(36). 被引量:3
  • 2[1]Roesch M. Snort-Lightweight Intrusion Detection For Networks[EB/OL]. www.snort.org,1999-09.
  • 3[2]Desai N. Increasing Performance in High Speed NIDS,A look at Snorts Internals[EB/OL]. http://www.cis.udel.edu/~zhi/www.docshow.net,2002-03.
  • 4M Botha,Rvon Solms.Utilising fuzzy logic and trend analysis for effective intrusion detection[].Computers and Security.2003
  • 5D Barbara,J Couto,S Jajodia,et al.Special section on data mining for intrusion detection and threat analysis:Adam:a test-bed for exploring the use of data mining in intrusion detection[].ACM SIGMOD Record.2001
  • 6H Gunes Kayacik,A Nur Zincir-Heywood,Malcolm I Heywood.On the capability of an som based intrusion detection system[].Proceedings of the International Joint Conference on Neural NetworksIEEE.2003
  • 7L Spitzner.Honeypot-Definitions and Value of Honeypots[]..2003
  • 8M Bilodeau,D Brenner.Theory of multivariate statistics[]..1999
  • 9P Z Hu,Malcolm I Heywood.Predicting intrusions with local linear model[].in Proceedings of the International Joint Con-ference on Neural NetworksIEEE.2003
  • 10刘宝旭,曹爱娟,许榕生.陷阱网络技术综述[J].网络安全技术与应用,2003(1):65-69. 被引量:23

共引文献20

同被引文献10

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2翟继强,叶飞.利用HONEYD构建虚拟网络[J].计算机安全,2006(3):46-48. 被引量:7
  • 3刘昭斌,刘文芝,魏俊颖.基于INTRANET的入侵防御系统模型的研究[J].化工自动化及仪表,2006,33(2):45-48. 被引量:4
  • 4Wang P,Wu L,Cunningham R, et al. Honeypot detection in advanced botnet attacks[J]. International Journal of Information and Computer Security, 2010,4(1) .. 30 - 51.
  • 5崇劫人.基于虚拟蜜网的入侵检测系统的研究[D].上海:上海交通大学,2010.
  • 6Khattab S, Melhem R, Moss6D, et al. Honeypot back- propagation for mitigating spoofing distributed Denial-of- Service attacks [J]. Journal of Parallel and Distributed Computing, 2006,66(9):1152- 1164.
  • 7Gupta A, Gupta S K, Ganesh I M, et al. Opaqueness characteristic of a context honeypot system [J]. Information Security Journal, 2010,19(3) .. 142 - 152.
  • 8Marchese M, Surlinelli R, Zappatore S. Monitoring unauthorized internet accesses through a honeypot' system [J]. International Journal of Communication Systems, 2011,24(1) :75 - 93.
  • 9Sardana A,Joshi R C, Kim T H, et al. Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: Honeypot based approach[J]. Journal of Intelligent Manufacturing, 2010,21(5) :623 - 634.
  • 10Wicherski Georg. Placing a iow--interaction honeypot in- the-wild:A review of mwcollectd[J]. Network Security, 2010(3)..7-8.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部