期刊文献+

基于无线局域网的入侵检测原理分析与实现

The Analysis and Implementation of Intrusion Detection Theory Based on Wireless LAN
原文传递
导出
摘要 无线局域网的安全问题已经引起越来越多的重视,对影响无线局域网安全的风险与威胁进行分析,在此基础上采取相应的对策是亟待解决的问题。本文在分析入侵检测原理的基础上,阐述了无线网络入侵检测系统的实现过程,包括包捕获模块、协议处理模块、日志记录模块以及检测机制与性能分析。 Wireless Local Area Network security problems have attracted more and more attention to the impact of wireless LAN security risks and threats analysis,on this basis to take corresponding countermeasures are urgently addressed.This paper analyzes the wireless network intrusion detection system based on the principles expounded the realization of the process of intrusion detection systems,including packet capture modules,protocol processing module,logging module and detection mechanism and performance analysis.
作者 曲进
出处 《信息与电脑(理论版)》 2009年第11期79-80,共2页 China Computer & Communication
关键词 无线局域网 入侵检测 性能分析 wireless LAN intrusion detection performance analysis
  • 相关文献

参考文献2

二级参考文献12

  • 1[1]Forrest S, Perrelason AS, Allen L, Cherukur R. Self_Nonself discrimination in a computer. In: Rushby J, Meadows C, eds. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1994. 202~212.
  • 2[2]Ghosh AK, Michael C, Schatz M. A real-time intrusion detection system based on learning program behavior. In: Debar H, Wu SF, eds. Recent Advances in Intrusion Detection (RAID 2000). Toulouse: Spinger-Verlag, 2000. 93~109.
  • 3[3]Lee W, Stolfo SJ. A data mining framework for building intrusion detection model. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 120~132.
  • 4[4]Vapnik VN. The Nature of Statistical Learning Theory. New York: Spring-Verlag, 1995.
  • 5[5]Lee W, Dong X. Information-Theoretic measures for anomaly detection. In: Needham R, Abadi M, eds. Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 2001. 130~143.
  • 6[6]Warrender C, Forresr S, Pearlmutter B. Detecting intrusions using system calls: Alternative data models. In: Gong L, Reiter MK, eds. Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1999. 133~145.
  • 7Denning D. An Intrusion-detection Model. IEEE Transactions on Software Engineering, 1987, 2: 222- 232.
  • 8Lee W. A Data Mining Framework for Constructing Features and Models tbr Intrusion Detection Systems. The Requirement for the Degree of Doctor, 1999.
  • 9Bass T, Road S. Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems. IRIS National Symposium Dnaft,1999.
  • 10Bass T. Intrusion Detection Systems & Multisensor Data Fusion. In:Creating Cyberspace Situational Awareness Communications of the ACM to Appear, 2000.

共引文献136

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部