期刊文献+

隐秘攻击与入侵检测的体系结构 被引量:1

Stealthy Attack and Architecture of IDS
下载PDF
导出
摘要 入侵检测系统(IDS)是目前研究的一个热点,IDS从攻击者的角度来看待系统安全,已经成为安全体系结构中不可缺少的一个环节。但是目前的IDS检测技术还不够成熟,存在一些方法使得攻击者可能绕开IDS的检测,文章探讨了一种所谓的隐秘攻击技术,这种方法用以攻击传统的基于关键字匹配的IDS。然后从如何检测隐秘攻击的角度出发讨论了IDS的安全体系结构。 Intrusion detection is a focus of current research, it looks on system security as attackers, and has become an indispensable component of system security architecture. But the detection technology is not advanced enough, there exists some methods that can evade the detection. This paper introduces a so-called stealthy attack technology, which can be used to attack traditional signature-based IDSs, then it discusses how to detect these stealthy attacks and the architecture design of IDS.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第2期72-74,95,共4页 Computer Engineering
基金 国家重点基础研究发展规划项目(G1999035801) 国家自然科学基金项目(90104030)
关键词 隐秘攻击 入侵检测 体系结构 计算机网络 网络安全 Intrusion detection; Stealthy attack; Security architecture
  • 相关文献

参考文献5

  • 1[1]Forrest S,Hofmeyr S,Somayaji A. Computer Immunology. Communications of the ACM, 1996-12
  • 2[2]Ghosh A K, Schwartzbard A, Schatz M. Learning Program Behavior Profiles for Intrusion Detection. Proceedings of the Ist USENIX Workshop on Intrusion Detection and Network Monitoring, 1999-04
  • 3[3]Forrest S,Hofmeyr S A, Somayaji A, et al.A Sense of Self for Unix Processes. Los Alamitos,CA:In Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
  • 4[4]Lee W, Stolfo S J. Data Mining Approaches for Intrusion Detection.San Antonio, TX: In Proceedings of the 7th USENIX Security Symposium, 1998-01
  • 5[5]Segel L A. The Immune System as a Prototype of Autonomous Decentralized Systems. In Proceedings of the IEEE Conference on Systems, Man and Cybernetics, 1997

同被引文献8

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部