期刊文献+

分布式入侵检测系统综述 被引量:18

A Survey of Distributed Intrusion Detection System
下载PDF
导出
摘要 1 入侵检测随着Internet在全世界范围内的迅速扩展,计算机网络的安全问题越来越成为人们关注的一个热点问题.入侵检测(Intrusion Detection,ID)就是保障计算机及网络安全的措施之一.近几年,对于入侵检测技术的研究发展很快,出现了很多入侵检测系统.但是,随着新的攻击方法的不断出现,尤其是一些互相协作的入侵行为的出现,给入侵检测领域的研究带来了新的课题.早期的集中式入侵检测系统已经不能有效地防止这一类的入侵.因此,研究分布式入侵检测系统是十分必要的. The trend of the research on the intrusion detection systems is to design and set up distributed intrusion detection systems. In the paper, the concepts, methods and architectures of intrusion detection are presented, and the application of agent technology in intrusion detection system is introduced. Several representative architectures of distributed intrusion detection systems based on agent and the common Intrusion Detection Framework and its application and extension are summarized. The existing problems and the future researching direction in this field are proposed.
出处 《计算机科学》 CSCD 北大核心 2002年第3期16-19,共4页 Computer Science
基金 教育部跨世纪优秀人才基金 高等学校优秀青年教师教学和科研奖励基金
关键词 分布式入侵检测系统 计算机网络 网络安全 防火墙 Distributed system, Agent, Intrusion detection, Collaboration
  • 相关文献

参考文献24

  • 1蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:369
  • 2Debar H,Dacier M,Wespi A.Towards a taxonomy of intrusiondetection systems.Computer Networks,1999,31(8):805~822
  • 3Ilgun K,Kemmerer R A,Porras P A.State transition analysis:a rule-based intrusion detection approach.IEEE Transactions on Software Engineering,1995,21(3):181~199
  • 4Ko C,Ruschitzka M,Levitt K.Execution monitoring of securitycritical programs in distributed systems:A specification-based approach.In:IEEE.PROC IEEE COMPUT SOC SYMP RES SECUR PRIVACY.PISCATAWAY,NJ,(USA),1997.175~187
  • 5Hofmeyr S,Forrest S,Somayaji A.Intrusion detection using sequences of system calls.Journal of Computer Security,1998,6(3):151~180
  • 6Lindqvist U,Porras P A.Detecting computer and network misuse through the production-based expert system toolset (PBEST).In:Proc.of the IEEE Computer Society Symposium on Research in Security and Privacy.1999.146~161
  • 7Debar H,Becket M,Siboni D.A neural network component for an intrusion detection system.In:IEEE.PROC SYMP SECUR PRIVACY.PISCATAWAY,NJ (USA):IEEE SERVICE CENTER,1992.240~250
  • 8Mukherjee B,Heberlein L,Levitt K N.Network intrusion detection.IEEE Network,1994,8(3):26~41
  • 9Qu D,Vetter B,Wang F,et al.Statistical anomaly detection for link-state routing protocols.In:INT CONF NETWORK PROTOC.LOS ALAMITOS,CA,(USA):IEEE COMP SOC,1998.62~70
  • 10Lee W,Stolfo S,Mok K W.Data mining framework for building intrusion detection models.In:Proc.of the IEEE Computer Society Symposium on Research in Security and Privacy.1999.120~132

二级参考文献16

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 9刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 10Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年

共引文献475

同被引文献127

引证文献18

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部