期刊文献+

UNIX的审计跟踪与入侵活动分析 被引量:2

Audit Trail and Intrusion Detection on UNIX
下载PDF
导出
摘要 入侵检测是保护信息系统安全的重要途径之一 ,它通过分析审计事件来发现系统中的异常活动 .本文对UNIX的审计日志进行了讨论 ,并对常见的入侵模式进行了分析 ,最后讨论了该领域当前存在的问题及今后的研究方向 . Intrusion detection plays an important role in protecting information system securit. Anomalistic activities can be discovered by audit trails. In this paper, we discuss the log files on UNIX, and analyse the methods of attack. Finally, we discuss some problems in the intrusion detection.
出处 《云南民族学院学报(自然科学版)》 2003年第1期52-54,共3页 Journal of Yunnan University of The Nationalities(Natural Sciences Edition)
基金 云南省计算机技术应用重点实验室开放研究基金支持
关键词 审计跟踪 入侵检测 信息安全 审计日志 UNIX操作系统 网络安全 入侵模式 Audit trail, Intrusion detection, Information security, Log file
  • 相关文献

参考文献4

二级参考文献8

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8王新,李作成.不可约关联规则及其应用[J].计算机应用,2001,21(7):15-17. 被引量:2

共引文献129

同被引文献6

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部