期刊文献+

基于分布式的电力系统入侵检测云安全模型研究 被引量:3

Research of a distributed intrusion detection cloud security model for power system
下载PDF
导出
摘要 如何保证电力系统自身的安全可靠运行、防止恶意攻击以及加强入侵检测功能等,已成为电力企业信息化建设过程中需要关注的问题。结合电力行业的实际应用,设计了一种专门应用于电力系统的入侵检测云安全模型(C-DIDS),该模型结合多重检测技术,在分析设备引擎中使用了三级检测方法,并且在分析设备中添加了信息完整性分析策略,通过不同云安全管理区中的监视设备进行交互通信,从而加强了整个电力系统入侵检测系统的综合防范能力。 How to ensure that the power system safe and reliable operation and prevent malicious attacks and to enhance in-trusion detection functions , needs attention for power enterprise information construction process . Based on the practical application of the power industry , the paper designs a specialized intrusion detection systems ( C-DIDS ) . This model combines multiple detection techniques , uses three detection methods in analysis equipment engines , and adds information analysis equipment integrity analysis strategy . It communicates through different areas of cloud security management monitoring equipment , to strengthen the capacity of the entire power system integrated prevention of intrusion detection systems .
出处 《微型机与应用》 2014年第14期57-59,63,共4页 Microcomputer & Its Applications
关键词 入侵检测 多重检测技术 信息完整性分析 云安全 电力系统 intrusion detection multidetection technology information integrality analysis cloud security power system
  • 相关文献

参考文献5

  • 1PORRAS P P,NEUMANN P G.EMERALD:event monitor- ing enabling response to anomalous live disturbances[C].The 20'h National Information System Security Conference,US, 1997 : 353-363.
  • 2SPAFFORD E H,ZAMBONI D.Intrusion detection using automomous ageots[J].Computer Networks, 2000,34(3) : 547- 570.
  • 3赵丽,孙敏.一种融合多检测技术的分布式入侵检测模型[J].计算机工程,2005,31(9):148-150. 被引量:2
  • 4许蓉,吴灏,张航.“云安全”检测技术安全性分析[J].计算机工程与设计,2012,33(9):3309-3312. 被引量:8
  • 5李志永,黄五划,毕嫒媛.基于云安全的人侵检测模型[C]南京:第六届中国信息和通信安全学术会议(CCICS),2009.

二级参考文献18

  • 1Andress M.Surviving Security: How to Integrate People,Process and Technology[M].Beijing,China Machine Press.2002-01
  • 2Snapp S R,Brentano J,Dias G V,et al.DIDS-- Motivation,Architecture,and An Early Prototype [C].Proceedings of 14th National Computer Security Conference,1991-10:167-176
  • 3Hochberg J,Jackson K,Stallings C,et al.NADIR: An Automated System for Detecting Network Intrusion and Misuse[J].Computer Security,1993,12(3)
  • 4Remmerer R A.NSTAT[R]: A Model-Based Real Time Network Intrusion Detection System.Technical Report TRCS97-18,Reliable Software Group,Department of Computer Science,1997
  • 5Porras P P,Neumann P G .EMERALD: Event Monitoring Enabling Response to Anomalous Live Disturbances[C].The 20th National Information System Security Conference,1997:353-363
  • 6Chen Staniford,Cheung S,Crawford R,et al.GRIDS: A Graph Based Intrusion Detection System for Large Networks[C].In Proceedings of the 19th National Information System Security Conference,1996,1:361-370
  • 7Spafford E H,Zamboni D.Intrusion Detection Using Automomous Agents[J].Computer Networks,2000,34:547-570
  • 8White F.A Model for Data Fusion[C].SPIE Conference on Sensor Fusion Orlando.FL,1988-04
  • 9XU L,Krzyzak A,Suen C Y.Methods for Combining Multiple Classfiers and Their Applications to Handwriting Recognition[J].IEEE Transaction on System and Man Cybermetics,1992,22:418-435
  • 10Jon Oberheide, Evan Cooke, Farnam Jahanian. Rethinking antivirus.- Executable analysis in the network cloud [C]. USENIX Association, Boston, MA. 2nd USENIX Workshop on Hot Topics in Security, 2007-08.

共引文献8

同被引文献21

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部