期刊文献+

网络攻击源追踪系统模型 被引量:3

A Framework of Network Attacker-Tracing System
下载PDF
导出
摘要 入侵检测是识别网络攻击的主要手段 ,现有的入侵检测系统可以检测到大多数基于网络的攻击 ,但不能提供对真实攻击来源的有效追踪 .据此 ,结合现有的入侵检测技术提出了网络攻击源追踪系统的模型 ,阐述了该系统的体系结构和各部分的主要功能 ,给出了利用相关性分析对攻击者的攻击路径进行回溯的基本思想 .模拟结果表明 ,所提出的系统模型和相关性分析的思想是可行有效的 .最后 ,从安全性。 Intrusion detection is a major technique of identifying the network attackers. The intrusion detection systems available can find the event of most network based attacks, but cannot judge the real locations of attackers. On the basis of the existing techniques, this paper presented a framework of network attacker tracing system. It then provided the system architecture and listed the principal functions. By using of the relevant analysis, it gave the basic idea of retracing the attackers' paths. The simulation result shows that the framework and idea are feasible and efficient. Finally, the potential problems of such system from various respects such as security, practicability and tracing precision, etc. were analyzed.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2003年第3期411-415,共5页 Journal of Shanghai Jiaotong University
基金 中国高技术研究发展 ( 863 )计划 ( 2 0 0 1AA14 40 61) 上海市科技发展基金 ( 0 15 115 0 47)联合资助项目
关键词 入侵检测 攻击源追踪 网络监听 攻击签名 intrusion detection attacker tracing network monitoring attack signature
  • 相关文献

参考文献7

  • 1Denning D E. An Intrusion-detection model [J].IEEE Transactions on Software Engineer, 1987, SE-13(2):222-232.
  • 2Mukherjee B, Heberlein T, Levitt K. Network intrusion detection [J]. IEEE Network, 1994, 8 (3):26-41.
  • 3Shieh S P, Gligor V D. On a pattern-oriented model for intrusion detection[J]. IEEE Transactions on Knowledge and Data Engineering, 1997, 9(4): 661 -667.
  • 4蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:369
  • 5李小勇,谷大武,白英彩.DRIDS:一个分布式实时入侵检测系统模型[A].第二届中国信息和通信安全学术会议(CCICS'2001)论文集[C].北京:科学出版社,2001.117-121.
  • 6Schneier B. Applied cryptography, protocols, algorithms, and source code in C[M]. 2nd ed. New York: John Wiley & Sons, Inc, 1996.
  • 7Staniford-Chen S. Distributed tracing of intruders[D]. Berkeley: Univ of California, 1995.

二级参考文献9

  • 1Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 2刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 3Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 4Bian Zhaoqi,Pattern Recognition,1988年
  • 5边肇祺,模式识别,1988年
  • 6何华灿,人工智能导论,1988年
  • 7Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页
  • 8胡侃,夏绍玮.基于大型数据仓库的数据采掘:研究综述[J].软件学报,1998,9(1):53-63. 被引量:255
  • 9阮耀平,易江波,赵战生.计算机系统入侵检测模型与方法[J].计算机工程,1999,25(9):63-65. 被引量:49

共引文献368

同被引文献23

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2左羽.网络追踪技术研究[J].重庆工学院学报,2006,20(5):111-114. 被引量:3
  • 3[2]Bellovin S,Leech M,Taylor T.ICMP Traceback Messages[EB/OL].IETF Internet Draft"draft-ietf-itrace-04.Txt,Work in progress,2003.
  • 4[3]Thomas E.Daniels.Reference Models for the Concealment and Observation of Origin Identity in Store-and-forward Networks[EB/OL].http://home.eng.iastate.edu/~daniels/papers/diss.pdf,2002.
  • 5[5]Kunikazu Yoda,Hiroaki Etoh.Finding a Connection Chain for Tracing Intruders[EB/OL].http://www.research.ibm.com/trl/projects/security/chaintrace/paper/main.html,2000.
  • 6Ritehey R, Ammann P. Using model checking to analyze network vulnerabilities [C]// Proceedings of 2000 IEEE Symposium on Security and Privacy, Oakland, USA: IEEE Computer Society Press. 2000: 156- 165.
  • 7Sheyner O, Haines J, Jha S, et al. Automated generation and analysis of attack graphs [C]// Proceedings of 2002 IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Computer Society Press, 2002: 273-284.
  • 8Ritchey R, O'Berry B, Noel S. Representing TCP/IP connectivity for topological analysis of network security [C] // Proceedings of the 18th Annual Computer Security Applications Conference. San Diego, USA: IEEE Computer Society Press, 2002: 25-31.
  • 9Jajodia S, Noel S, O'Berry B. Topological analysis of network attack vulnerability [C]//Managing Cyber Threats: Issues, Approaches and Challenges. In: Kumar V, Srivastava J, Lazarevic A, eds. Fairfax, USA: Springer-Verlag, 2005: 248-266.
  • 10Mayer A, Wool A, Elisha Z. Fang: A firewall analysis engine [C] // Proceedings of 2000 IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Computer Society Press, 2000: 177-187.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部