期刊文献+

基于NIDS入侵检测模型的研究和探讨 被引量:2

Discussion and Research of Network Intrusion Detection System
下载PDF
导出
摘要 本文首先介绍入侵检测系统的基本原理,包括检测方法和分析技术,然后给出了一个网络入侵检测具体模型和事例,阐述了NIDS的重要性以及将来发展的趋势。 This paper firstly introduces the principle of intrusion detection system(IDS),and give s an example of network intrusion detection system,puts forward the importance of IDS under coming network,finally discuss es the development and future of NIDS.
出处 《现代计算机》 2003年第2期36-39,共4页 Modern Computer
关键词 NIDS 入侵检测模型 计算机网络 网络安全 防火墙 主机入侵检测系统 Intrusion Detection System(IDS) Network Intrusion Detection System(NIDS) Host Intrusion Detection System(HIDS)
  • 相关文献

参考文献4

  • 1Herve Debar,Marc Dacier, Andreas Wespi. Towards a Taxono My of Intrusion-detection Systems, Computer Networks 31, 1999
  • 2赵海波 李建华 杨宇航.智能入侵监测系统[J].上海交通大学学报,.
  • 3陈鹏,吕卫锋,单征.基于网络的入侵检测方法研究[J].计算机工程与应用,2001,37(19):44-48. 被引量:35
  • 4Terry Escamilla,吴焱.入侵者检测.北京:电子工业出版社,1999

二级参考文献13

  • 1[1]D E Denning. An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2) :222-2
  • 2[2]G Vigna,R A Kemmerer. NetSTAT:A Network-based Intrusion Detection Approach[C].Proceedings of the 14th Annual Computer Security Conference,Scottsdale,Arizona, 1998.12
  • 3[3]S Kumar. Classification and Detection of Computer Intrusions[D].PhD Dissertation. Department of Computer Sciences,PurdueUniversity,1995
  • 4[4]J Balasubramaniyan,J Omar Garcia-Fernandez,D Isacoff et al.An Architecture for Intrusion Detection using Autonomous Agents[R].Department of Computer Sciences,Purdue University,Coast TR 98-05,1998
  • 5[5]Frincke D,Don Tobin,Jesse McConnell et al.A Framework for Cooperative Intrusion Detection[C].Proceedings of the 21 st National Information Systems Security Conference,1998.10:361-373
  • 6[6]W Lee,S J Stolfo,K Mok. A Data Mining Framework for Building Intrusion Detection Models[C].Proceedings of the IEEE Symposium on Security and Privacy, 1999
  • 7[7]Guy Helmer,Johnny S K Wong,Vasant Honavar et al.Intelligent Agents for Intrusion Detection[C].Proceedings,IEEE Information Technology Conference, Syracuse, NY, 1998.9:121-124
  • 8[8]M Conner,C Patel,M Little. Genetic Algorithm/Artificial Life Evolution of Security Vulnerability Agents[C].Army Research Laboratory Federal Laboratory 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program(ATIRP),1999.2
  • 9[9]Jacobs S,D Dumas,W Booth et al.Security Architecture for Intelligent Agent Based Vulnerability Analysis[C].Proceedings:3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution Research Program, College Park, MD.37,1999.2: 447-451
  • 10[10]Barrett Michael,W Booth,M Conner et al. Intelligent Agents System Requirements and Architecture[R].Report to ATIRP,1998.10

共引文献36

同被引文献4

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部