期刊文献+

关于网络入侵检测技术的研究 被引量:2

About Network Intrusion Detection Technology Research
下载PDF
导出
摘要 随着计算机网络的飞速发展,计算机网络的安全越来越受到人们的重视,复杂化、多样化的网络世界里,应该怎样去维护计算机的网络安全,已成为社会关注的焦点。目前,入侵检测技术是针对网络攻击现象的一种有效解决途径,它通过计算机网络或计算机系统中的若干关键点收集信息并对其进行分析,从中发现网络或系统中是否有违反安全策略的行为和被攻击的迹象,此种检测技术是保证计算机网络安全的核心技术之一,对网络应用的发展具有重要意义与深远影响。 With the rapid development of the computer network,people nowadays pay more attention to the security of the computer network,thus how to maintain such matter has become the focus of social concerns in the complicated and diversified network world.Currently,the technology of intrusion detection is a comparatively effective way to solve the condition of network attack,which adopts the computer network or some key points in the computer system to collect information and analyze it,thus discovering whether there is behavior against the security policy and signs of attack in the network or system.The technology of detection is one of the core technologies to ensure the security of the computer network,which has important significance and profound impacts on the network applications.
作者 何文彬
出处 《电脑知识与技术(过刊)》 2011年第5X期3285-3287,共3页 Computer Knowledge and Technology
关键词 入侵检测技术 异常检测 误用检测 IDS technology of intrusion detection abnormal detection misuse detection IDS
  • 相关文献

参考文献3

二级参考文献27

  • 1W Lee, A Data Mining Framework for Constructing Feature and Model for Intrusion Detection System: [Ph D Thesis][D]. Columbia University, 1999.
  • 2J Ayres, J Flanniek, J Gehrke,et al. Sequential Pattern Mining Using a Bitmap Representation[AJ. SIGKDD[C]. 2002.429-435.
  • 3DARPA Intrusion Detection Evaluation[EB/OL]. http://www. 11. mit. edu/IST/ideval/, 2004-05.
  • 4VernPaxson. Bro: A System for Detecting Network Intruders in Rcal-Time[J]. Computer Networks, 1999, 31(23-24):2435-2463.
  • 5Abbes T, Bouhoula A, Rusinowitch M. Protocol analysis in intrusion detection using decision tree[A]. Proceeding of the International Conference on Information Technology: Coding and Computing (ITCC'04) [C]. Los Alamitos, USA:IEEE Computer Society Press, 2004. 404-409.
  • 6Kruegel C, Toth T. Using decision trees to improve signature-based intrusion detection[A]. Proceeding of RAID'2003 [C]. Berlin Heidelberg New York: Springer-Verlag, 2003.173-191.
  • 7Erbacher R F, Frincke D. Visualization in detection of intrusions and misuse in large scale networks[A]. Proceeding of the International Conference on Information Visualization '2000[C]. Los Alamitos, USA: IEEE Computer Society Press, 2000. 294-299.
  • 8Spitzner L. The honeynet project: Trapping the hackers[J]. IEEE Security and Privacy, 2003, 1(2): 15-23.
  • 9Anderson J P.Computer security thread monitoring and surveillance[R]. Fort Washington, USA: James P Anderson Co, 1980.
  • 10Denning D E. An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 222-232.

共引文献52

同被引文献4

引证文献2

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部