期刊文献+

高速网络环境下的网络入侵检测系统 被引量:4

Research on Network Intrusion Detection System for High-speed Network
下载PDF
导出
摘要 基于数据过滤与负载均衡技术 ,提出了一个能应用在高速环境下的网络入侵检测系统 ,给出了一个综合考虑实时负载、可用性及能力的负载均衡算法 ,即基于应用的最小负载优先算法 ;采用分布式的网络入侵检测系统的结构 。 A network intrusion detection system (NIDS) based on data filter and load balance was described. The system can be applied to the high speed network environment. A load balance algorithm called application based least load first was presented. The algorithm considers the availability and load of analysis hosts. The network intrusion detection module was designed according to the framework of distributed network intrusion detection system, and the technique of mobile agent was used to implement the mobility and dynamic update of intrusion detection code. The system may solve the problem of real time online detection of network intrusion for high speed networks.
作者 李信满 赵宏
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2002年第7期621-623,共3页 Journal of Northeastern University(Natural Science)
基金 国家'八六三'高技术计划项目 (863 3 0 6 ZT0 5 0 5 5 863 3 17 0 1 0 3 99)
关键词 高速网络环境 网络入侵检测 负载均衡 移动代理 协议分析 安全交换机 数据过滤 high speed network network intrusion detection load balance mobile agent protocol analysis secure switch data filter
  • 相关文献

参考文献2

二级参考文献16

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8[1]Denning D E. An Intrusion-detection model[J]. IEEE Transactions on software engineering, 1987,13(2):222-232.
  • 9[2]Liepins G E, Vaccaro H S. Intrusion detection: its role and validation[J]. Computers & Security, 1992,11:347-355.
  • 10[3]Vaccaro H S, Liepins G E. Detection of anomalous computer session activity[EB/OL]. http:∥dblp.uni-trier.de/db/conf/sp/sp1989.html.2000-09-15.

共引文献134

同被引文献24

  • 1陈训逊,方滨兴,李蕾.高速网络环境下入侵检测系统结构研究[J].计算机研究与发展,2004,41(9):1481-1487. 被引量:10
  • 2李浪,陈溪辉,罗文,眭仁武.大学校园无纸化办公网络安全策略模型研究[J].衡阳师范学院学报,2004,25(6):80-83. 被引量:5
  • 3刘学波,孟丽荣.高速网络环境下的网络入侵检测系统的研究[J].计算机工程与设计,2005,26(5):1236-1238. 被引量:11
  • 4NSS Group. Intrusion Detection and Vulnerability Assessment[R].Technical Report, NSS, Oakwood House, Wennington, Cambridge Shire, UK, 2000.
  • 5Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful Intrusion Detection for High-speed Networks[J]. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy,2002:285-293.
  • 6Gokhale M, Dubois D, Dubois A, et al. Granidt: Towards Gigabit Rate Network Intrusion Detection Technology. Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-programmable Logic and Applications, 2002.
  • 7Chan P C, Wei V K. Preemptive Distributed Intrusion Detection Using Mobile Agents. Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), 2002:103 - 108.
  • 8MIT Lincoln Laboratory. DARPA Intrusion Detection Evaluation.http:∥www.11.mit.edu/IST/ideval, 1999.
  • 9Ning P, Cui Y, Reeves D S. Analyzing intensive intrusion alerts via correlation[EB/OL].http://infosec.csc.ncsu.edu/pubs/raid-02.pdf, 2003-01-05.
  • 10Ning P, Cui Y, Reeves D S. Constructing attack scenarios through correlation of intrusion alerts[EB/OL].http://infosec.csc.ncsu.edu/pubs/ccs02.pdf, 2003-01-05.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部