期刊文献+

基于防火墙的网络入侵检测系统 被引量:14

Firewall-Based Intrusion Detection System
下载PDF
导出
摘要 提出了一个基于防火墙的网络入侵检测系统模型 ,克服了传统入侵检测系统不能实现主动控制的缺陷 ,并对设计与实现中的关键技术做了详细的描述·该系统在数据链路层截取实时的数据包 ,对其进行基于安全策略的访问控制分析 ;同时利用事件发生器从截获的IP包中提取出概述性事件信息并传送给入侵检测模块进行安全分析·入侵检测模块采用基于统计的入侵检测技术 ,并采用了Naive Bayes算法·基于该模型设计实现的系统在实际测试中表明对于具有统计特性的网络入侵具有较好的检测与控制能力· A network intrusion detection system (IDS) based on firewall was described. This system may solve the problem of the traditional IDS which is lack of the active access control online. In this model, time varying data packets are captured on data link layer,and then filtered according to the security policy. Meanwhile,the captured IP packets are reduced to summary events by the event engine to represent the important attributes. After that, these events are transferred to the intrusion detection module to make intrusion analysis. Statistics based intrusion detection and Naive Bayes algorithm were used. The prototype system based on the model was implemented and tested in the real network environment. The system is good at detecting and controlling the network intrusions with statistical features in nature.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2001年第5期489-492,共4页 Journal of Northeastern University(Natural Science)
基金 国家'八六三'高技术项目 ( 86 3 30 6 ZT0 5 0 5 5 )
关键词 入侵检测 防火墙 Naive-Bayes算法 安全策略 访问控制 网络 intrusion detection firewall Naive Bayes algorithm security policy access control anomaly detection
  • 相关文献

参考文献9

  • 1[1]Denning D E. An Intrusion-detection model[J]. IEEE Transactions on software engineering, 1987,13(2):222-232.
  • 2[2]Liepins G E, Vaccaro H S. Intrusion detection: its role and validation[J]. Computers & Security, 1992,11:347-355.
  • 3[3]Vaccaro H S, Liepins G E. Detection of anomalous computer session activity[EB/OL]. http:∥dblp.uni-trier.de/db/conf/sp/sp1989.html.2000-09-15.
  • 4[4]Kumar S. Classification and detection of computer intrusions[D]. West Lafayette: Purdue University,1995.
  • 5[5]Debar H, Dacier M. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31:805-822.
  • 6[6]Ravi S. Sandhu. Authentication, access control, and intrusion detection[J]. IEEE Communications, 1994,32(9):40-48.
  • 7[7]Bass T. Intrusion detection systems and multisensor data fusion[J]. Communications of the ACM, 2000,43(4):99-105.
  • 8[8]Porras P A,Kemmerer R A. A rule-based intrusion detection approach[A]. In: Gove R ed. Proceedings of the Eighth Annual Computer Security Applications Conference[C]. San Antonio: IEEE Computer Society Press, 1992.220-229.
  • 9[9]Lachiche N. Naive bayesian classifier [EB/OL]. http:∥www.cs.bris.ac.uk/research/ Machine Learning/1BC/ilp99/node2.html. 1999-06-15.

同被引文献38

  • 1杨余旺,杨静宇,孙亚民.分布式拒绝服务攻击的实现机理及其防御研究[J].计算机工程与设计,2004,25(5):657-660. 被引量:15
  • 2Boyer R S, Moore J S. A fast string searching algorithm [ J ]. Communications of the ACM, 1977, 20 ( 10 ) : 761-772.
  • 3韩东海,王超,李群编.网络安全技术概论[M].北京:国防工业出版社,2003.
  • 4(美)RobertL.Ziegler. 余青霓 周刚等译.Linux防火墙[M].人民邮电出版社,2000..
  • 5Heberlein L T.A network security monitor[A].Proceeding of the IEEE Symposium on Research in Security and Privacy [C].Oakland,CA:IEEE,1990.296-304.
  • 6Forrest S,Hofmeyr S A,Somayaji A.Computer Immunology[J].Communications of the ACM,1997,40(10):88-96.
  • 7Hofmeyr S A,Forrest S.Architecture for an Artificial Immune System[J].Evolutionary Computation,2000,7(1):1289-1296.
  • 8Carter J H.The immune system as a model for pattern recognition and classification[J].Journal of the American Medical Informatics Association,2000,7(3):28-41.
  • 9Timmis J,Knight T.Artificial immune system:Using the immune system as inspiration for data mining[A].Abbass H A,Sarker R A,Newton C S.Data Mining:A Heuristic Approach[C].Hershey:Idea Publishing Group,2001.209-230.
  • 10Nolfi S,Florano F.Learning and Evolution[J].Autonomous Robots,1999,7(1):89-113.

引证文献14

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部