期刊文献+

IDS入侵检测系统的分析与研究

The Analysis and Study on Intrusion Detection System
下载PDF
导出
摘要 .入侵检测技术的发展给网络安全的研究带来了新的途径。本文首先对入侵检测系统(IDS)的历史和发展进行了阐述,并详细描述了几类入侵检测系统及其优缺点,最后着重对入侵检测方法进行讨论,并提出了一些新的研究思路。 Intrusion detection system is a new way to study the network security technology.This paper first introduces the history and definition of the intrusion detection system,and then discusses several kinds of intrusion detection system and gives their advantages and disadvantages.At last it also discusses the intrusion detection technology and gives some new study trends in the study of intrusion detection system.
出处 《现代计算机》 2002年第7期33-36,共4页 Modern Computer
关键词 IDS 入侵检测系统 网络安全 专家系统 神经网络 防火墙 计算机网络 Intrusion detection system Network security Expert system Neural networks
  • 相关文献

参考文献3

二级参考文献16

  • 1[1]D E Denning. An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2) :222-2
  • 2[2]G Vigna,R A Kemmerer. NetSTAT:A Network-based Intrusion Detection Approach[C].Proceedings of the 14th Annual Computer Security Conference,Scottsdale,Arizona, 1998.12
  • 3[3]S Kumar. Classification and Detection of Computer Intrusions[D].PhD Dissertation. Department of Computer Sciences,PurdueUniversity,1995
  • 4[4]J Balasubramaniyan,J Omar Garcia-Fernandez,D Isacoff et al.An Architecture for Intrusion Detection using Autonomous Agents[R].Department of Computer Sciences,Purdue University,Coast TR 98-05,1998
  • 5[5]Frincke D,Don Tobin,Jesse McConnell et al.A Framework for Cooperative Intrusion Detection[C].Proceedings of the 21 st National Information Systems Security Conference,1998.10:361-373
  • 6[6]W Lee,S J Stolfo,K Mok. A Data Mining Framework for Building Intrusion Detection Models[C].Proceedings of the IEEE Symposium on Security and Privacy, 1999
  • 7[7]Guy Helmer,Johnny S K Wong,Vasant Honavar et al.Intelligent Agents for Intrusion Detection[C].Proceedings,IEEE Information Technology Conference, Syracuse, NY, 1998.9:121-124
  • 8[8]M Conner,C Patel,M Little. Genetic Algorithm/Artificial Life Evolution of Security Vulnerability Agents[C].Army Research Laboratory Federal Laboratory 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program(ATIRP),1999.2
  • 9[9]Jacobs S,D Dumas,W Booth et al.Security Architecture for Intelligent Agent Based Vulnerability Analysis[C].Proceedings:3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution Research Program, College Park, MD.37,1999.2: 447-451
  • 10[10]Barrett Michael,W Booth,M Conner et al. Intelligent Agents System Requirements and Architecture[R].Report to ATIRP,1998.10

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部