期刊文献+

入侵检测产品的评价指标 被引量:4

Intrusion Detection Product Evaluation Criteria
原文传递
导出
摘要 入侵检测系统( IDS)是一种新的防御黑客攻击的安全工具。介绍了 IDS的基本知识,分析了商用 IDS产品的最新市场动态和几种有代表性的 IDS产品,为 IDS的选择和实现提供了一套评价指标。 Intrusion detection systems (IDS) are one of the latest security tools in the battle against hackers. This paper provides basic intrusion detection information. Finally it presents a categorized list of criteria that can be used to evaluate intrusion detection systems for selection and implementation.
作者 罗嵘
出处 《通信技术》 2001年第2期45-46,52,共3页 Communications Technology
关键词 入侵检测系统 评价指标 计算机网络 网络安全 intrusion detection system, evaluation criteria, security technology
  • 相关文献

参考文献3

  • 1[1]Ranum M. Intrusion detection systems: expectations, ideals and realities. Computer Security Journal, 1 999; XIV (4): 25 ~ 45
  • 2[2]Hart R, Morgan D, Tran H. An introduction to automated intrusion detection approaches. Information Management & Computer Security,1999(2): 76 ~ 82
  • 3[3]Vigna G, Kemmerer R A. NetSTAT: a network - based intrusion detection system. Journal of Computer Security, 1999 (7): 37 ~ 71

同被引文献30

  • 1吕志军,金毅,赖海光,黄皓,谢立.DAPRA测试分析和IDS测试方法研究[J].计算机科学,2004,31(11):73-76. 被引量:4
  • 2The Shmoo Group. CaPture the CaPture the Flag Data [DB/OL]. [2006-04-11]. http: //cctf. shmoo, corn/.
  • 3PUKETZA N, ZHANG K, CHUNG M, et al. A Methodology for Testing Intrusion Detection Systems [ J ]. IEEE Transaction on Software Engineering, 1996, 22 (10) : 719-729.
  • 4RICHARD LIPPMANN, ROBERT K CUNNINGHAM. Results of the DARPA 1998 Off-Line Intrusion Detection Evaluation [R]. [S. l. ] : MIT Lincoln Laboratory, 1999.
  • 5MELL P, HU V, LIPPMANN R, et al. An Overview of Issues in Testing Intrusion Detection Systems [ R]. [ S. l. ] : National Institute of Standards and Technology, 2003.
  • 6TIAN Jun-feng, LIU Tao, JIAO Hong-qiang. Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems [ C ] //Electronic Commerce and Security, 2008 International Symposium on. Washington, DC, USA : IEEE Computer Society, 2008: 592-598.
  • 7DEBAR H, DACIER M, WESPI A, et al. An Experimentation Workbench for Intrusion Detection Systems [ R]. [ S. l. ] : IBM Zurich Research Laboratory, 1998.
  • 8SHIPLEY G. ISS RealSecure Pushes Past Newer IDS Players, Network Computing [ EB/OL]. (1999-05-17). http: //www. networkcomputing, com/1010/1010rl, html.
  • 9DEBAR H, DORIZZI B. An Application of a Recurrent Network to an Intrusion Detection System [ C ] //International Joint Conference on Neural Networks (IJCNN). Baltimore, MD, USA: Is. n. ], 1992: 478-483.
  • 10Richard Lippmann,Robert K Cunningham et al.Results of the DARPA 1998 Offline Intrusion Detection Evaluation[R].MIT Lincoln Laboratory, 1999.

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部