期刊文献+

CIDF的组件通信分析和算法描述 被引量:3

Analysis and Algorithm Description of Communication Among components in CIDF
下载PDF
导出
摘要 介绍了(通用入侵检测框架)基本结构。针对组件在本地和远端两种情况下的组件通信机制进行了深入的分析。并在分析CIDFIDS的基础上,提出了基于框架的组件通信过程的可行性算法描述。 In this paper, we introduce the architecture of CIDF,and make some analysis of communication methods among IDS components which are in remote or local server. According to the analysis, the algorithm description of the main process of the communication is proposed.
作者 余祥宣 卢刚
出处 《计算机工程》 CAS CSCD 北大核心 2002年第5期141-142,146,共3页 Computer Engineering
关键词 入侵检测系统 防火墙 网络安全 CIDF 组件通信分析 算法描述 Intrusion detection Common intrusion detection framework(CIDF) Communication, Algorithm description
  • 相关文献

参考文献4

  • 1[1]Staniford-chen S, Tung B,Schnackenberg D.The Common Intrusion Detection Framework (CIDF). Information Survivability Workshop. Orlando FL,1998-10
  • 2[2]Kahn C, Ponas P, Staniford-chen S,et al. Common Intrusion Detection Framework. Journal of Computer Secutity, 1998-07
  • 3[3]Porras P, Schnackenberg D, Stillman D M,et al.The Common Intrusion Detecti on Framework Architecture.Online, 1999. http://www gidos.org/ drafts/architecture.txt.
  • 4[4]Debar H, Dacier M,Wespi A.Towards a Taxonomy of Intrusion-detect ion Systems. Computer Networks, 1999,31(8): 805 822

同被引文献21

  • 1王佰玲,方滨兴,云晓春.零拷贝报文捕获平台的研究与实现[J].计算机学报,2005,28(1):46-52. 被引量:67
  • 2yawl.入侵检测系统(IDS)简介[EB/OL].http://sinbad.zhoubin.com,2001—01—10.
  • 3Nation Institute of Standards and Technology. Guide to Intrusion Prevetion and Prevention Systems (IDPS)[R]. 2007.
  • 4Heberlein L, Dias G, Levitt K, et al, A Network Security Monitor[C]// Proc of the IEEE Symp on Research in Security and Privacy, 1990:296-304.
  • 5StevensWR.TCP/IP详解卷一:协议[M].北京:机械工业出版社,2000.
  • 6StevensWR.TCP/IP详解卷二:实现[M].北京:机械工业出版社,2000.
  • 7Briney A. What Isn' t Intrusion Prevention? [ EB / OL].http://www. infosecuritymag.com, 2002 - 04.
  • 8Porras P, Schnackenberg D. The Common Intrusion Detection Framework Architecture [ EB/OL ]. htrp://www. isi.edu/gost/cidf / , 1999 - 09.
  • 9Wood M, Erlinger M. Intrusion detection message exchange requirements [EB/OL]. http://www.silicondefense.com/idwg/draft-ietf-idwg-requirements-07, txt,2002-06 23.
  • 10Curry D,Debar H,Merrill Lynch. Intrusion detection message exchange format:data model and extensible markup language (XML),document type definition [EB/OL]. http ://www. silicondefense, com/idwg/draft-ietf-idwg-idmefxml-07, txt, 2002-06-20.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部