期刊文献+

协议异常检测技术在核电厂实时信息系统中的应用 被引量:2

Application of Protocol Anomaly Detection Technology in Real Time Information System of Nuclear Power Plant
下载PDF
导出
摘要 网络安全是当前人人关注的焦点问题,入侵检测技术因具有主动防御特性而成为研究重点。针对核电厂实时信息系统建立协议异常检测系统,实现结合网络数据的转移和频率特性的检测算法,并从系统部署、运行流程等方面介绍系统的功能。运行结果表明,此系统能够有效检测入侵。 The network security status of the real time information system in nuclear power plant is investigated, and the current status of unitary safety means is reported. In accordance with the transfer and frequency characteristics of network data, the detection algorithm which combines both characteristics is proposed, and the protocol anomaly detection system is established. The functions of system are introduced from the aspects of system deployment , running processes, etc. The result of operation indicates that this system can effectively detect intrusion.
出处 《自动化仪表》 CAS 2015年第2期42-44,共3页 Process Automation Instrumentation
关键词 网络安全 入侵检测 异常检测 协议异常检测 核电厂 Network security Intrusion detection Anomaly detection Protocol anomaly detection Nuclear power plant
  • 相关文献

参考文献4

二级参考文献35

  • 1李娜,秦拯,张大方,陈蜀宇.基于Markov Chain的协议异常检测模型[J].计算机科学,2004,31(10):66-68. 被引量:6
  • 2穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 3穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 4高磊,张德运,Md Jahangir Alam,张军,胡国栋.基于Petri网的TCP协议异常检测模型[J].西安交通大学学报,2006,40(6):659-662. 被引量:4
  • 5Balasubramaniyan J S, Garcia Fernandez J O, Isacoff D, et al. An Architecture for Intrusion Detection Using Autonomous Agents[ C]//The 14th Annual Computer Security Applications Conference. Phoenix, AZ: IEEE Computer Society, 1998:13 - 24.
  • 6Das Kumar. Protocol Anomaly Detection for Network- Based Intrusion Detection [ R ]. GSEC Practical Assignment Version 1.2f, 2001.
  • 7Lemonnier E. Protocol Anomaly Detection in Network- Based IDSs[R]. Stockholm: Defcom, 2001.
  • 8Beetle Sasha. A Strict Anomaly Detection Model for IDS [EB/OL]. Phrack, (2000) [2008-10-23]. http:////www. phrack.com/issues. html? issue = 56 &id = 11.
  • 9Yoo I S. Protocol Anomaly Detection and Verification[ C] //Proc of the 2004 IEEE 5th Annual IEEE Workshop on Assurenee and Security. INSTICC Press, 2004: 299- 304.
  • 10Abdullah I S, Menasce D A. Protocol Specification and Automatic Implantation Using XML and CBSE[C]//Proc of International Conference on Communications, Internet and Information Technology. Calgary, AB: ACTA Press, 2003:17 - 19.

共引文献123

同被引文献3

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部