期刊文献+

网络安全报警关联研究

The Research of Network Security Alert Correlation
下载PDF
导出
摘要 随着网络攻击的日趋智能化,大量安全设备被部署在网络中,它们在保护网络的同时,也为网络管理员的分析工作带来了新的挑战,如何从这些安全设备产生的海量信息中挑选出有效信息,并还原攻击场景,仅靠人工操作是难以完成的。在这种情况下,网络安全报警关联技术应运而生。该文在分析了几种传统的安全报警关联系统体系结构后,着重介绍了当前比较流行的几种网络安全报警关联方法,并分析了其优缺点。 As the network attack is more and more sophisticated, enormous security devices are deployed to protect the network, which brings new challenges to network administrators. It’s hard to choose effective information and revert the whole attack scenes by human. Network security alert correlation appeared under this condition. This article firstly analyzes the classical security alert correlation system's architecture, then stressly introduces several popular methods of network alert security correlation, and analyzes their virtues and flaws respectively.
作者 陈尘 陈佳佳
出处 《电脑知识与技术》 2009年第6X期4928-4930,共3页 Computer Knowledge and Technology
关键词 体系结构 入侵检测 网络安全报警 关联分析 architecture intrusion detection network security alert correlation analysis
  • 相关文献

参考文献12

  • 1彭雪娜,闻英友,赵宏.网络安全信息关联与分析技术的研究进展[J].计算机工程,2006,32(17):1-3. 被引量:5
  • 2穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 3David Curry,Herve Debar,et al.IDMEF Data Model and XML DTD. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-16.txt . 2006
  • 4Cristopher Kriigel,Thomas Toth,Clemens Kerer.Decentralized event correlation for intrusion detection[].Procth International Conference on Information Security and Cryptology.2001
  • 5Zhitang Li,Aifang Zhang,Jie Lei,Li Wang.Real-Time Correlation of Network Security Alerts[].IEEE International Conference on e-Business Engineering.2007
  • 6Benferhat,S.,Kenaza,T.,Mokhtari,A.A Na?ve Bayes Approach for Detecting Coordinated Attacks[].Computer Software and Ap-plicationsCOMPSAC’nd Annual IEEE International.2008
  • 7Wan Li,Yan Zhu,Shengfeng Tian.Intrusion Alerts Correlation Model Based on XSWRL Ontology[].Intelligent Information Tech-nology ApplicationIITA’Second International Symposium on.2009
  • 8Alfonso V,Keith S.Probabilistic Alert Correlation[].Proc of the th Interna- tional Symposium on Recent Advances in Intrusion Detection.2001
  • 9Cui,Y.A toolkit for intrusion alerts correlation based on prerequisites and consequences of attacks[]..2002
  • 10P.Ning,,Y.Cui,and D.S.Reeves.Constructing attack scenarios through correlation of intrusion alerts. Proceedings of the9th ACM Conference on Computer and Communications Security.Nov18-222002 . 2002

二级参考文献9

  • 1穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 2Benjamin M,Herve D.Correlation of Intrusion Symptoms:An Application of Chronicles[C].Proc.of the 6th International Symposium on Recent Advances in Intrusion Detection,Pittsburgh,PA.USA:Springer-Verleg,2003.
  • 3Steven C,Ulf L,Martin F.Modeling Multistep Cyber Attacks for Scenario Recognition[C].Proc.of Third DARPA Information Survivability Conference and Exposition,Washington,2003.
  • 4Christopher K,Thomas T,Clemens K.Decentralized Event Correlation for Intrusion Detection[D].Technical University of Vie-nna Information Systems Institute,2002.
  • 5Peng N.Techniques and Tools for Analyzing Intrusion Alerts[J].ACM Trans.on Inf.Syst.Secur.,2004,7(2):274-318.
  • 6Frederic C,Alexandre M.Alert Correlation in a Cooperative Intrusion Detection Framework[C].Proc.of IEEE Symposium on Security and Privacy,Oakland,California,USA,2002.
  • 7Steven T,Karl L.A Requires/provides Model for Computer Attacks[C].Proc.of Workshop on New Security Paradigms.Ballycotton,County Cork,Ireland,2000.
  • 8Qin Xinzhou,Lee Wenke.Statistical Causality Analysis of INFOSEC Alert Data[C].Proc.of the 6th International Symposium on Recent Advances in Intrusion Detection,Pittsburgh,PA,2003.
  • 9Alfonso V,Keith S.Probabilistic Alert Correlation[C].Proc.of the 4th International Symposium on Recent Advances in Intrusion Detection.Springer-Verlag,2001.

共引文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部