期刊文献+

入侵检测中阈值的优化设置研究 被引量:1

Research on Optimal-Setting of IDS' Thresholds
下载PDF
导出
摘要 入侵检测系统的各个性能指标不可能同时达到最好的状态,片面地追求检测率的最大化而不考虑其他指标可能使目标系统的可靠性有所下降。因此需在这些性能指标之间做出权衡和折衷,才能使被保护系统的整体安全性达到一个被认可的程度。由此构造一个入侵检测过程模型,在此基础上进行测试,使得不同性能指标对目标系统可靠性的影响做出详细的分析,从而使入侵检测中各性能指标之间的阈值得到较为优化的设置,提高系统的可靠性。 Intrusion Detection System' s performance indicators can not be achieved at the best state simuhaneously. One sided pursuit of the maximum of detection rate without considering other indicators may cause a decrease of target system' s reliability at the same time, then the tradeoffs must be made between the performance indicators. In this way, seeurity of the proteeted system can achieve a degree of reeognition. This paper introduces an intrusion deteetion process model. Based on the model, the influence of target system' s reliability, which is produced by different performance indicators is analyzed in detail. Then the thresholds of intrusion detection are optimal - settled, the system' s reliability is improved.
作者 赵丽 邓曦辉
出处 《网络新媒体技术》 2016年第3期6-9,16,共5页 Network New Media Technology
基金 山西省高校教改项目(J2015108)
关键词 入侵检测 阈值 容侵 目标系统的可靠性 intrusion detection, threshold, intrusion tolerance, TSR
  • 相关文献

参考文献2

二级参考文献14

  • 1S Forrest, AS Perelson, L Allen et al. Self-nonsdf discrimination in a computer. In: Proc of the 1994 IEEE Symp on Research in Security and Privacy. Los Alamitos, CA- IEEE Computer Society Press, 1994.
  • 2R Maxion, K M C Tan. Benchmarking anomaly-based detection systems. The 1st Int'l Conf on Dependable Systems & Networks,New York, USA, 2000.
  • 3Samuel Patton, William Yurcik, David Doss. An Achilles' heel in signature-based IDS: Squealing false positives in SNORT. The 4th Int'l Symp on Recent Advances in Intrusion Detection (RAID),University of California--Davis, USA, 2001.
  • 4Stephanle Forrest, Steven, A Hofmeyr et al. A sense of self for Unix processes. In: IEEE Symp on Security and Privacy.Oakland, California: IEEE Computer Society Press, 1996. 120--128.
  • 5Christina Warrender, Stephanie Forrest, Barak Pearlmutt.Detecting intrusions using system calls: Alternative data model.In: IEEE Symp on Security and Privacy. Oakland, California:IEEE Computer Society Press, 1999. 133--145.
  • 6Yah Qiao, Xie Weixin et al. An anomaly intrusion detection method based on HMM. Electronics Letters, 2002, 38(13) : 663~664.
  • 7H S Javitz, A Valdes. The SRI IDES statistical anomaly detector.In: Proc of the IEEE Symp on Research in Security and Privacy,Oakland, CA: IEEE Computer Society Press, 1991.
  • 8Steven A Hofmeyr. An immunological model of distributed detection and its application to ctmaputer security [Ph D dissertation]. Department of Computer Sciences, University of New Mexico, Albuquerque, NM, 1999.
  • 9Yan Qiao, Xie Weixin. A network IDS with low false positive rate. In: Proc of the Congress on Evolutionary Computation 2002. Honolulu, HI: IEEE Computer Society Press, 2002.
  • 10Stefan Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans on Information and System Security, 2000, 3(3): 186--205.

共引文献23

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部