期刊文献+

状态转换图在IDS中的应用

The Application of STAT in IDS
下载PDF
导出
摘要 入侵检测系统 (IDS)作为一种重要的计算机系统安全监测手段 ,已经成为维护网络安全的主要技术之一 本文提出的改进模型是在一个现有的入侵检测原型系统的基础之上 ,利用STAT(StateTransitionAnalysisTool,状态转换分析工具 )技术对其分析引擎增加了有效的辅助模块 ,并使用数据挖掘技术对原始审记数据进行初步的数据清洗 与原有的IDS相比 ,改进后的系统有效地提高了入侵检测性能和精度 。 As an important security inspection approach of computer system, Intrusion Detection System (IDS) has become an indispensable technology for maintaining network security. The improved model put forward by this paper is based on a current IDS prototype and adds an efficient assistant module to its analysis engine by using STAT (State Transition Analysis Tool) technology, and it also uses data mining technique to perform preparatory data purge on the original audit records. Compared with previous IDS prototype, the improved system promotes the performance and precision of intrusion detection effectively and possesses fine expansibility and robust.
作者 王伟
出处 《烟台大学学报(自然科学与工程版)》 CAS 2003年第1期65-72,共8页 Journal of Yantai University(Natural Science and Engineering Edition)
基金 江苏省应用研究基础项目 (BJ0 0 0 0 0 2 ) 教育部"跨世纪优秀人才培养计划"基金项目 "东南大学网络和信息集成教育部重点实验室"(93K9)访问学者基金资助项目
关键词 状态转换图 IDS 网络安全 人侵检测系统 移动代理 数据控掘 network security Intrusion Detection state transition mobile agent data mining
  • 相关文献

参考文献12

  • 1Denning, Dorothy E. An intrusion detection model[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 222~232.
  • 2Lunt T F, Jagannathan R. A prototype real-time intrusion-detection expert system[A].In Proceedings of the 1988 IEEE Symposium on Security and Privacy,1988. 59~66.
  • 3Anderson D, Frivold T, Valdes A. Next-generation Intrusion Detection Expert System (NIDES): A Summary[R]. SRI International Technical Report SRI-CSL-95-07.
  • 4Smaha S E. Haystack: an intrusion detection system[A]. In the 4th Aerospace Computer Security Applications Conference,1988. 37~44.
  • 5Lankewicz L, Benard M. Real-time anomaly detection using a nonparametric pattern recognition approach[A].In Proceedings of the 7th Annual Computer Security Applications Conference,1991. 80~89.
  • 6Vaccaro H S, Liepins G E. Detection of anomalous computer session activity[A]. In Proceedings of the 1989 IEEE Symposium on Security and Privacy,1989. 280~289.
  • 7Sandeep K, Eugene H S. An Application of Pattern Matching in Intrusion Detection[R]. Technical Report CSD-TR-94-013.Purdue:Purdue University, COAST Laboratory,1996.
  • 8Crosbie M, Dole B, Ellis T,et al. IDIOT Users Guide[R]. Technical Report TR-96-050.Purdue:Purdue University, COAST Laboratory,1996.
  • 9Koral I,Richard A K,Phillip A P.State transition analysis:a rule-based intrusion detection approach[J]. IEEE Transactions on Software Engineering,1995,21(3):181~199.
  • 10Vigna G,Richard A K.NetSTAT:A nerwork-based intrusion detection approach[A].In Proceedings of the 14th Annual Computer Security Application Conference.Arizona:Scottsdale,1998.1~10.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部