期刊文献+

网络安全事件流中异常检测的方法分析

On Anomaly Detection Method of Network Security Event Flow
下载PDF
导出
摘要 伴随着计算机的普及应用与网络安全问题的日益突出,探寻一种网络安全异常的检测方式已经显势在必行。而优良的网络安全检测方法可以动态的反应网络的安全状况,及时的做出预警。本文之所以网络安全事件流的异常检测为论述对象,就是因为它不仅可以检测到来自外部的攻击,还可以检测用户本身在日常的操作中所使用的非授权行为。 Along with the popularization of computer and network security issues become more prominent,exploring a network security anomaly detection approach has become obvious imperative.The excellent network security testing methods can dynamically reflect network security and make a timely warning.It not only detects external attack,but also detects the unauthorized acts the users used in the daily operation.
作者 杨常勇
出处 《价值工程》 2012年第3期149-149,共1页 Value Engineering
关键词 网络安全 异常检测 分析 方案 network security anomaly detection analysis program
  • 相关文献

参考文献3

二级参考文献16

  • 1Anderson JP. Computer security threat monitoring and surveillance. Technical Report, Contract 79F26400. Fort Washington,Pennsylvania, James P. Anderson Company, 1980.
  • 2Mukherjee B, Heberlein LT, Levitt KN. Network intrusion detection. IEEE Network, 1994,8(3):26-41.
  • 3Bace RG. Intrusion Detection. Macmillan Technology Publishing, 2000.
  • 4Ilgun K, Kemmerer RA, Porras PA. State transition analysis: A rule-based intrusion detection approach. IEEE Trans, on Software Engineering, 1995,21(3):181-199.
  • 5Vigna G, Kemmerer RA. NetSTAT: A network-based intrusion detection system. Journal of Computer Security, 1999,7(1):37-71.
  • 6Porras PA, Neumann PG. EMERALD: Event monitoring enabling response to anomalouslive disturbances. In: Proc. of the 20th National Information Systems Security Conf. National Institute of Standards and Technology, 1997.353-365.
  • 7Cheung S. Lindqvist U, Fong MW. Modeling multistep cyber attacks for scenario recognition. In: Proc. of the 3rd DARPA Information Survivability Conf. and Exposition (DISCEX Ⅲ), Washington: IEEE computer Society Press. Vol I, 2003.284-292.
  • 8Cuppens F, Miège A. Alert correlation in a cooperative intrusion detection framework. In: Proc. of the 2002 IEEE Symp. on Security and Privacy (S&P 2002). 2002. 202-215.
  • 9Ning P, Xu DB, Healey CG, St. Amant RA. Building attack scenarios through integration of complementary alert correlation methods. In: Proc. of the 1 lth Annual Network and Distributed System Security Symp (NDSS 2004). 2004.97-111.
  • 10Valdes A, Skinner K. Probabilistic alert correlation. In: Lee W, Mé L, Wespi A, eds. Proc. of the 4th Int'l Symp. on Recent Advances in Intrusion Detection (RAID 2001). Davis: Springer-Verlag, 2001.

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部