期刊文献+

入侵检测方法的研究现状 被引量:2

Present Research of Intrusion Detection Method
下载PDF
导出
摘要 网络安全问题日益突出,入侵检测系统的研究日渐兴盛,在传统的入侵检测方法基础上,不断地改进,并探索与遗传算法、免疫算法等智能算法结合,向着更智能更多元化发展。该文从误用检测和异常检测两方面入手,探讨了现有的用于入侵检测的方法,并对其进行优势与劣势的对比。最后就入侵检测技术研究趋势进行了分析。 Network security issues become increasingly serious,and the research of intrusion detection system grows prosperity.The traditional methods of intrusion detection are constantly improved and changed towards more intelligent and more diversi?fied by combining with intelligent methods such as genetic algorithm and immune algorithm.In this paper,existing methods for intrusion detection are analyzed in the two aspects of misuse detection and anomaly detection,and comparisons are analyzed through their advantages and disadvantages.Finally Intrusion Detection Technology trends are analyzed.
作者 高苗粉
出处 《电脑知识与技术》 2013年第11X期7402-7404,共3页 Computer Knowledge and Technology
关键词 入侵 检测 误用 异常 intrusion detection misuse anomaly
  • 相关文献

参考文献2

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2Steven Andrew Hofmeyr.An Immunological Model of Distributed Detection and Its Application to Computer Security[]..1999

二级参考文献46

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献233

同被引文献7

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部