期刊文献+

基于网络状态的入侵检测模型 被引量:5

A Network-State-Based Intrusion Detection Model
下载PDF
导出
摘要 本文提出了一种基于网络状态的入侵检测模型。该模型结合网络入侵的目标和特点 ,利用有穷自动机理论 ,基于网络协议来实现进程和操作系统的状态建立 ,从而可以发现未知的入侵。本文论证了应用该模型的可行性 ,并利用通用入侵检测框架CIDF对应用该模型的入侵检测系统进行了描述 ,最后与其它入侵检测模型进行了比较。 First this paper presents a network-state-based intrusion detection model.This model is established by using DFA theory,the characters and the goals of net-attacks and fully depending on the states of the processes of net protocols and operation system so that it can discover unknown attacks.This paper proves that the model is feasible for intrusion detection and describes the IDS that uses this model to describe net-attacks by CIDF(Common Intrusion Detection Framework).In the end,the paper compares the model with other intrusion detection descriptions.
出处 《信息工程大学学报》 2002年第3期9-14,共6页 Journal of Information Engineering University
关键词 入侵检测 有穷自动顶 网络状态 通用入侵检测框架 Intrusion detection DFA Network State CIDF
  • 相关文献

参考文献2

  • 1高仲仪 金茂忠.编译原理及编译程序构造[M].北京:北京航空航天大学出版社,1999..
  • 2龚俭 陆晟 等.计算机网络安全导论[M].南京:东南大学出版社,1999..

同被引文献39

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:232
  • 2T Tidwell,R Larson,K Fitch et al.Modeling Internet Attacks[C].In:Proceedings of the 2001 IEEE Workshop on Information Assurance and Security,2001:54~59
  • 3Michael Spibey J.The Z notation:a reference manual[M].2nd edition,Prentice Hall,1992
  • 4Reduce,Grosse,G Smith.Object-Z:a specification language advocated for the description of standards[S].Computer Standards and Interfaces,1995:511~533
  • 5Lippmann R P, Cunningham R K. Improving Imrusion Detection Performance Using Keyword Selection and Neural Networks. Computer Networks-the International Journal of Computer and Telecommunications Networking, 2000,34 (4) : 597-603
  • 6VAN DEURSEN T, RADOMIROVI( S. Algebraic attacks on RFID protocols[C]//Proceedings of the Third IFIP WG 11.2 International Work Shop on Information Security Theory and Practice. Smart Devices: Pervasive Systems, and Ubiquitous Networks. Berlin: Springer, 2009: 38-51.
  • 7MITROKOTSA A, R1EBACK M R, TANENBAUM A S. Classifying RFID attacks and defenses[J]. Information Systems Frontiers, 2010, 12(5): 491-505.
  • 8FU Y, ZHANG C, WANG J. A research on denial of service attack in passive RFID system[C]//Anti-Counterfeiting Security and Identification in Communication (ASID), 2010 International Conference on. [S.l.]: IEEE, 2010: 24-28.
  • 9VAN DEURSEN T, RADOMIROVIC S. Attacks on RFID protocols[EB/OL]. (2008-07-12). http://eprint.iacr.org/2008/ 310.
  • 10JUELS A. RF1D security and privacy: a research survey[J]. Selected Areas in Communications, IEEE Joumal on, 2006, 24(2): 381-394.

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部