期刊文献+

Linux环境下入侵检测系统的研究与实现

Research and Implementation of Intrusion Detection System in Linux Environment
下载PDF
导出
摘要 在设计入侵检测系统时,针对传统入侵检测系统中采用的模式匹配方法计算量大、漏报率和误报率高等缺点,提出基于协议分析和规则匹配相结合的方法,通过高度规则的网络协议优势来减少系统的工作复杂度,有效地提高检测的准确性并降低漏报率。 In the period of designing intrusion detection system,with the traditional mode matching method whose computation is great and which has high missing rate and high false alarm rate,puts forward a new method which combines protocol analysis with rule match.With the advantage of network protocols which follow standards,the new method can reduce the working complexity of our system.So the method can effectively increase the accuracy of detection and decrease the missing rate.
出处 《现代计算机》 2011年第16期56-60,共5页 Modern Computer
基金 武汉科技大学大学生创新基金(No.10ZRZ041)
关键词 入侵检测 协议分析 网络安全 Intrusion Detection Protocol Analysis Network Security
  • 相关文献

参考文献4

二级参考文献16

  • 1[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000
  • 2[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998
  • 3[3]Brian Caswell.snort.http:∥www.snort.org/
  • 4[4]ISS Company. RealSecure Network Protection.http:∥www.iss.net/products_services/enterprise_protection/rsnetwork/index.php
  • 5[5]Ilgun K,Kemmerer R A,Porras P A.State transition a.nalysis:A rulebased intrusion detection approach[J].Software Engineering,IEEE Transactions on, 1995; 21 (3): 181 ~ 199
  • 6[6]Vigna G,Kemmerer R A.NetSTAT:A Network-based Intrusion Detection Approach[C].In:Proceedings of the 14th Annual Computer Security Applications Conference(ACSAC), 1998
  • 7[7]Alec Yasinsac. An Environment for Security Protocol Intrusion Detection[J].Journal of Computer Security,2002; (10): 177~188
  • 8[8]Shan Zheng,Chen Peng,Xu Ying et al.A network state based intrusion detection model. Computer Networks and Mobile[C].In:Computing,2001.Proceedings.2001 International Conference on,2001:481~486
  • 9[9]Karen Kent Frederick. Network Intrusion Detection Signatures,Part 5.http:∥online.securityfocus.com/infocus/1569,2002
  • 10[10]Stevens W R.TCP/IP Illustrated,Volume 1 :The Protocols[M].Addison Wesley, 1994

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部