期刊文献+

网络入侵行为模式研究 被引量:1

Study on the Network Intrusion Session Model
下载PDF
导出
摘要 针对网络入侵行为模式进行分析,给出由图像函数定义的系统状态,包括主体和客体、主体和客体关系、保护设置和合法流矩阵,利用系统状态的所有直接和间接关系确定系统转换过程中行为模式的变化及其规则,在此基础上简单分析了"特洛伊木马"的检测方法. The network intrusion session model is discussed in this paper. The system states are defined with image function including the subjects, objects, relations of the subject and object, preventing rules, and legal flow matrix. The transform and rules of the network intrusion session model is analyzed with the system states. On the basis of the above, the Trojan horse detection method is briefly discussed,in which the Trojan horse is an intrusion code with masquerading a legitimate program. 
出处 《天津大学学报(自然科学与工程技术版)》 EI CAS CSCD 北大核心 2003年第2期254-256,共3页 Journal of Tianjin University:Science and Technology
基金 天津市自然科学基金资助项目(003700211).
关键词 特洛伊木马 系统状态 入侵行为模式 Trojan horse system state intrusion session model
  • 相关文献

参考文献1

二级参考文献15

  • 1[1]Denning D E. An intrusion detection model. IEEE Trans Software Engineering, 1987,2(2):222-232
  • 2[2]Richard P Lippmann. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 2000,34(4):579-595
  • 3[3]Refik Molva. Internet security architecture. Computer Networks, 1999,31(8):787-804
  • 4[4]Richard P Lippmann, Robert K Cunningham. Improving intrusion detection performance using key word selection and neural networks. Computer Networks, 2000, 34(4):597-603
  • 5[5]Richard Feiertag, Sue Rho, Lee Benzinger et al. Intrusion detection inter-component adaptive negotiation. Computer Network, 2000, 34(4):605-621
  • 6[6]Peter Sommer. Intrusion detection systems as evidence. Computer Networks, 1999,31(23):2477-2487
  • 7[7]Herve Debar, Marc Dacier, Andreas Wespi. Towards a taxonomy of intrusion-detection systems. Computer Networks, 1999, 31(8):805-822
  • 8[8]Koral Ilgum, Richard A Kemmerer, Phillip A Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Trans Software Engineering, 1995,21(3):181-199
  • 9[9]Nicholas J Puketza, Kui Zhang, Mandy Chung et al. A methodology for testing intrusion detection systems. IEEE Trans Software Engineering, 1996, 22(10):719-729
  • 10[10]Harris B, Hunt R. TCP/IP security threats and attack methods. Computer Communications, 1999, 22(10):885-897

共引文献5

同被引文献14

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部