期刊文献+

安全攻击特征自动提取技术研究

Research on Security Attack Signature Automatic Extraction Technology
下载PDF
导出
摘要 安全攻击特征的提取是基于特征的入侵检测技术的关键。攻击特征自动提取能够自动地发现新攻击,并提取出新攻击的特征。从攻击特征自动提取的现状入手,对安全攻击特征自动提取技术进行了分类研究和详细介绍。 The security attack signature extraction is the key issue in the intrusion detection technology. The security attack signature Automatic extraction can find new attacks automatically and extract new attacks signatures. By investigating the present situation of security attack signature extraction, this paper studied the classification of automatic security attack sig- nature extraction technologies.
作者 万民 刘堃
出处 《电脑编程技巧与维护》 2013年第20期101-103,共3页 Computer Programming Skills & Maintenance
关键词 入侵检测 安全攻击 特征 自动提取 Intrusion Detection Security Attack Signature Automatic Extraction
  • 相关文献

参考文献15

  • 1方欣,邓斌.一种改进的入侵检测模式匹配算法[J].湖南理工学院学报(自然科学版),2012,25(1):38-41. 被引量:3
  • 2Taylor C, Alves-Foss J. NATE: Network Analysis of A no- malous Traffic E vents, a low-cost approach [C] //Proceed- ings of the 2001 workshop on New security paradigms. ACM, 2001: 89-96.
  • 3Debar H, Becket M, Siboni D. A neural network component for an intrusion detection system [ C] //Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Soci- ety Symposium on. IEEE, 1992: 240-250.
  • 4蒲天银,饶正婵,秦拯.网络攻击特征数据自动提取技术综述[J].计算机与数字工程,2013,41(4):611-615. 被引量:3
  • 5Singh S, Estan C, Varghese G, et al. Automated Worm Finger- printing [C] //OSDI. 2004, 4: 4-4.
  • 6Wang K, Stolfo S J. Anomalous payload-based network intru- sion detection [C] //Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2004: 203-222.
  • 7唐勇,卢锡城,王勇军.攻击特征自动提取技术综述[J].通信学报,2009,30(2):96-105. 被引量:19
  • 8Tang Y, Chen S. Defending against internet worms: A signa- ture-based approach [ C] //INFOCOM 2005. 24th Annum Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. IEEE, 2005, 2: 1384-1394.
  • 9Li Z, Sanghi M, Chen Y, et al. Hamsa: Fast signature genera-tion for zero-day polymorphic worms with provable attack re- silience [ C] //Security and Privacy, 2006 IEEE Symposium on. IEEE, 2006:15 -47.
  • 10An architecture for generating semantics-aware signatures [M] . Defense Technical Information Center, 2006.

二级参考文献52

  • 1唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 2崔玮,刘建伟,张其善.基于Snort和改进BM算法的入侵检测系统的研究与实现[J].电子测量技术,2006,29(6):144-146. 被引量:7
  • 3KABIRI P, GHORBANI A A. Research on intrusion detection and response: a survey[J]. International Journal of Network Security. 2005, 1(2): 84-102.
  • 4KREIBICH C, CROWCROFT J. Honeycomb-creating intrusion detection signatures using honeypots[A]. Proceedings of the Second Workshop on Hot Topics in Networks (Hotnets Ⅱ)[C]. Boston: 2003. 51-56.
  • 5YEGNESWARAN V, GIFFIN J T, BARFORD P, et al. An architecture for generating semantics-aware signatures[A]. Proceedings of the 14th USENIX Security Symposium[C]. Baltimore, MD, USA, 2005. 97-112.
  • 6NEWSOME J, KARP B, SONG D. Polygraph: automatically generating signatures for polymorphic worms[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Washington, DC, USA, IEEE Computer Society, 2005.226-241.
  • 7KIM H A, KARP B. Autograph: toward automated, distributed worm signature detection[A]. Proceedings of USENIX Security Symposium[C]. 2004.271-286.
  • 8CRANDALL J R, WU S F, CHONG F T. Experiences using minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities[A]. Proceedings of GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)[C]. 2005.359-389.
  • 9CRANDALL J R, SU Z, WU S F, et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits[A]. Proceedings of the 12th ACM Conference on Computer and Communications Security[C]. New York, NY, USA, ACM Press,2005.235-248.
  • 10VARGIYA R, CHAN P. Boundary detection in tokenizing network application payload for anomaly detection[A]. Proceedings of ICDM Workshop on Data Mining for Computer Security(DMSEC)[C]. 2003.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部