期刊文献+

几种入侵检测规则语言分析

Analysis of Several IDS Description Languages
下载PDF
导出
摘要 主要着眼于基于误用检测的入侵检测系统,讨论了模式库的建立基础——入侵描述语言。通过比较几种比较典型的描述语言,并分析了它们各自的优缺点,从而为开发更为完善的入侵描述语言打下基础。 The intrusion detection system (IDS) is a new security technology. In this paper, we mainly emphasize IDS based on the misuse detection. And discuss the intrusion description language, which is the foundation of the pattern library. Several typical description languages are compared and analyzed. Through analyzing their advantages and disadvantages, we can give the base of developing more perfect intrusion description language.
出处 《河北工业大学学报》 CAS 2003年第3期9-14,共6页 Journal of Hebei University of Technology
基金 "十五"国防预研资助项目(413150703)
关键词 网络安全 入侵检测 规则语言 误用检测 模式库 network security IDS description language misuse detection pattern library
  • 相关文献

参考文献6

二级参考文献36

  • 1胡华平.基于代理的网络入侵检测系统基本原型的详细设计.863项目验收材料之二[M].,2001..
  • 2国家863计划信息安全技术发展战略研究专家组.基于代理的网络入侵检测“项目验收结论”[M].,2001..
  • 3胡华平.国家八六三计划项目验收自评估报告.863项目验收材料之三[M].,2001..
  • 4Debar H,Dacier M,Wespi A.Towards a taxonomy of intrusiondetection systems.Computer Networks,1999,31(8):805~822
  • 5Ilgun K,Kemmerer R A,Porras P A.State transition analysis:a rule-based intrusion detection approach.IEEE Transactions on Software Engineering,1995,21(3):181~199
  • 6Ko C,Ruschitzka M,Levitt K.Execution monitoring of securitycritical programs in distributed systems:A specification-based approach.In:IEEE.PROC IEEE COMPUT SOC SYMP RES SECUR PRIVACY.PISCATAWAY,NJ,(USA),1997.175~187
  • 7Hofmeyr S,Forrest S,Somayaji A.Intrusion detection using sequences of system calls.Journal of Computer Security,1998,6(3):151~180
  • 8Lindqvist U,Porras P A.Detecting computer and network misuse through the production-based expert system toolset (PBEST).In:Proc.of the IEEE Computer Society Symposium on Research in Security and Privacy.1999.146~161
  • 9Debar H,Becket M,Siboni D.A neural network component for an intrusion detection system.In:IEEE.PROC SYMP SECUR PRIVACY.PISCATAWAY,NJ (USA):IEEE SERVICE CENTER,1992.240~250
  • 10Mukherjee B,Heberlein L,Levitt K N.Network intrusion detection.IEEE Network,1994,8(3):26~41

共引文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部