期刊文献+

一种改进的入侵检测模式匹配算法 被引量:3

An Improved Pattern Matching Algorithm For Intrusion Detection
下载PDF
导出
摘要 随着网络的普及,网络安全问题日益严峻,入侵检测技术己经成为计算机与网络安全的重要组成部分.本文首先介绍了入侵检测的基础知识,然后对入侵检测中的模式匹配BM算法进行分析,并在此基础上提出了改进的GBM算法,该算法有效的提高了模式匹配的效率. With the popularity of the network,the resulting network security is becoming increasingly serious;intrusion detection technology has become an important component of network security.This paper introduces the basics of intrusion detection and intrusion detection on the BM algorithm for pattern matching analysis,and on this basis,the improved GBM proposed algorithm effectively improves the efficiency of pattern matching.
作者 方欣 邓斌
出处 《湖南理工学院学报(自然科学版)》 CAS 2012年第1期38-41,49,共5页 Journal of Hunan Institute of Science and Technology(Natural Sciences)
基金 湖南省教育厅项目(10C0758) 湖南省教育厅项目(04C272)
关键词 入侵检测 模式匹配 BM算法 SNORT intrusion detection pattern matching BM algorithm Snort
  • 相关文献

参考文献9

  • 1Rebecca G B. lnstrusion Detection[J]. Macmillan Technical Publishing 2000, 60(5): 1347-1349.
  • 2国家计算机网络应急技术处理协调中心.2009年中国互联网网络安全报告[M].北京:电子工业出版社,2010:1-3.
  • 3薛静峰.入侵检测技术[M]北京:机械工业出版社,2004.
  • 4彭波.数据结构[M].北京:清华大学出版社,2004:71-73.
  • 5Boyer R S and Moore J S. A fast string searching algorithm[J]. Comm. ACM, 1977, 20(10): 762-772.
  • 6LEF, DEF. Language Reference Version 54[J]. USA: Cadence Design System Inc, 2003, 56(5): 57-62.
  • 7严蔚敏,吴伟民.数据结构[M].北京:清华大学出版社,2004:80-84.
  • 8崔玮,刘建伟,张其善.基于Snort和改进BM算法的入侵检测系统的研究与实现[J].电子测量技术,2006,29(6):144-146. 被引量:7
  • 9卡斯维尔.Snort20入侵检测[M].宋劲松,译.北京:国防工业出版社,2004.

二级参考文献8

  • 1胡和平,肖述超.一种分布式入侵检测系统模型[J].计算机工程与科学,2005,27(7):4-6. 被引量:4
  • 2李雪梅,代六玲,童新海,李莉.一种串匹配的快速Boyer-Moore算法[J].计算机应用研究,2005,22(9):49-51. 被引量:7
  • 3张乃孝.数据结构[M].北京:高等教育出版社,1998.ZHANG Nai-xiao. Data Structure. Beijing: Higher Education Press, 1998.
  • 4GOSCINSKI A.A synchronization algorithm for processes with dynamic priorities in computer networks with node failures[J].Information Processing Letters,1989,32 (3):129-136.
  • 5GOSCINSKI A.Two Algorithms for Mutual Exclusion in Real-time Distributed Computer Systems[J].Journal of Parallel and Distributed Computing,1990,9 (1):77-82.
  • 6RAYMOND K.A Tree-based Algorithmfor Distributed Mutual Exclusion[J].ACM Transactions on Computer Systems.1989,7 (1):61-77.
  • 7HARATHI K,JOHNSON T.A Priority Synchronization Algorithm for Multiprocessors[ R ].Technical Report tr93.005.FTP.cis.ufl.edu:cis/Ptechreports,1993.
  • 8HOUSNI A,Tréhel M.Specification of the Prioritized Algorithm for N groups[Z].Laboratoire dpInformatique de lpUniversitéde Franche Comt é,France,February 2001.

共引文献39

同被引文献25

  • 1Taylor C, Alves-Foss J. NATE: Network Analysis of A no- malous Traffic E vents, a low-cost approach [C] //Proceed- ings of the 2001 workshop on New security paradigms. ACM, 2001: 89-96.
  • 2Debar H, Becket M, Siboni D. A neural network component for an intrusion detection system [ C] //Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Soci- ety Symposium on. IEEE, 1992: 240-250.
  • 3Singh S, Estan C, Varghese G, et al. Automated Worm Finger- printing [C] //OSDI. 2004, 4: 4-4.
  • 4Wang K, Stolfo S J. Anomalous payload-based network intru- sion detection [C] //Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2004: 203-222.
  • 5Tang Y, Chen S. Defending against internet worms: A signa- ture-based approach [ C] //INFOCOM 2005. 24th Annum Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. IEEE, 2005, 2: 1384-1394.
  • 6Li Z, Sanghi M, Chen Y, et al. Hamsa: Fast signature genera-tion for zero-day polymorphic worms with provable attack re- silience [ C] //Security and Privacy, 2006 IEEE Symposium on. IEEE, 2006:15 -47.
  • 7An architecture for generating semantics-aware signatures [M] . Defense Technical Information Center, 2006.
  • 8Newsome J, Song D. Dynamic taint analysis for automatic de- tection, analysis, and signature generation of exploits on com- modity software [J], 2005.
  • 9Costa M, Crowcroft J, Castro M, et al. Vigilante: End-to-end containment of internet worms [C] //ACM SIGOPS Operating Systems Review. ACM, 2005, 39 (5) : 133-147.
  • 10Bhatkar S, DuVaruey D C, Sekar R. Address obfuscation: An efficient approach to combat a broad range of memory error exploits [C] //Proceedings of the 12th USENIX security sym- posium, 2003, 120.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部