期刊文献+

基于协议分析的网络入侵检测系统 被引量:4

Network Intrusion Detection System Based on Protocol Analysis
下载PDF
导出
摘要 传统的网络入侵检测系统已经不能满足如今人们对网络安全的要求。基于网络协议分析,提出一种内部规则和外部规则相结合的改进的系统设计。在外部规则中,设计一种新的特征描述语言,类似传统的编程语言,易懂且功能强大。通过内部规则的引入,将协议分析检测中的逻辑进行丰富,实现对复杂、含状态的攻击的检测。相比较于现有的系统,新设计的网络入侵检测系统的检测区域更加精准,检测能力得到提高。 Traditional network intrusion detection system has been unable to meet people' s demands of network security today. This paper presents a new design with internal rules and external rules based on protocol analysis. In external rules, a new threats description language is designed, which is similar to traditional programming languages, understandable and powerful. The inter- nal rules enrich the logic in detection so that complex threats or even which with status can be detected. Compared with the sys- tem available,this new clarion is more accurate and more powerful.
出处 《计算机与现代化》 2014年第2期201-204,共4页 Computer and Modernization
关键词 网络安全 侵检测 协议分析 network security intrusion detection protocol analysis
  • 相关文献

参考文献3

二级参考文献24

  • 1[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000
  • 2[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998
  • 3[3]Brian Caswell.snort.http:∥www.snort.org/
  • 4[4]ISS Company. RealSecure Network Protection.http:∥www.iss.net/products_services/enterprise_protection/rsnetwork/index.php
  • 5[5]Ilgun K,Kemmerer R A,Porras P A.State transition a.nalysis:A rulebased intrusion detection approach[J].Software Engineering,IEEE Transactions on, 1995; 21 (3): 181 ~ 199
  • 6[6]Vigna G,Kemmerer R A.NetSTAT:A Network-based Intrusion Detection Approach[C].In:Proceedings of the 14th Annual Computer Security Applications Conference(ACSAC), 1998
  • 7[7]Alec Yasinsac. An Environment for Security Protocol Intrusion Detection[J].Journal of Computer Security,2002; (10): 177~188
  • 8[8]Shan Zheng,Chen Peng,Xu Ying et al.A network state based intrusion detection model. Computer Networks and Mobile[C].In:Computing,2001.Proceedings.2001 International Conference on,2001:481~486
  • 9[9]Karen Kent Frederick. Network Intrusion Detection Signatures,Part 5.http:∥online.securityfocus.com/infocus/1569,2002
  • 10[10]Stevens W R.TCP/IP Illustrated,Volume 1 :The Protocols[M].Addison Wesley, 1994

共引文献386

同被引文献34

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部