期刊文献+

集成化网络安全监控平台的研究与实现 被引量:13

Study and implementation of integrated network security monitoring system
下载PDF
导出
摘要 入侵检测系统 (IDS) 意在检测对计算机系统的未授权使用、误用和滥用。针对目前IDS普遍存在的缺乏有效监控平台的情况,我们提出了一种能够支持多种异构Sensor、多源证据关联以及可视化推理判断的集成化网络安全监控平台NSMS,给出了NSMS的体系结构,并就“证据获取”、“证据处理”、“结果可视化报告”三个关键技术进行了详细阐述。本平台已经在集成化网络安全监控及防卫系统Net-Keeper中得到实现和应用,实际应用表明本平台是一个开放、高效和可视化的网络安全实时监控平台。 The main intention of intrusion detection system (IDS) is to detect the action of unauthorized use, misuse, and all other abuse of computer systems, but it lacks of an effective monitoring console. In this paper, a novel model of integrated network security monitoring system (NSMS) is proposed, not only NSMS can capture different kinds of intrusion events from multiple and distributed heterogeneous Sensors, but also it can correlate these relative proofs, finally it can visualize the reasoning process. In this paper, we present the framework of NSMS, and then discuss some key issues of implementation, which are proof-getting, 損roof-correlation and result-visualization respectively. As the kernel of integrated network security and defense system, the prototype of NSMS has already been developed and tested, it is proved to be efficient, open and practical in network security monitoring.
出处 《通信学报》 EI CSCD 北大核心 2003年第7期155-163,共9页 Journal on Communications
基金 国家杰出青年基金资助项目(60243001) 国家自然科学基金资助项目(60243001) 国家"863"计划资助基金项目(2001AA140213)
关键词 网络安全 入侵检测系统 入侵关联分析 贝叶斯算法 目标树推理 可视化显示 intrusion detection system(IDS) alert correlation Bayes goal-tree deduce visualization
  • 相关文献

参考文献9

  • 1HANJW KambrM 范明 孟小峰译.数据挖掘-概念与技术[M].北京:机械工业出版社,2001..
  • 2JOHN M, ALAN C, JULIA A. Defending yourself: the role of intrusion detection systems[J]. IEEE Softvare, 2000,17(5):42-51.
  • 3PHILLIP A P, PETER G N EMERALD: Event monitoring enabling responses to anomalous live disturbances [A]. In Proceedings of the 1997 National Information Systems Security Conference[C]. Baltimore, MD, October 1997.
  • 4VIGNA, G, KEMMERER R A. Net STAT: a network-based intrusion detection approach. [A] Computer Security Applications Conference, 1998 proceedings[C]. 1998.25-34.
  • 5Internet security system, Inc. Real secure getting started guide version 5.5 [EB/OL]. Http://www.iss.net.2000-09.
  • 6The NSS Group. IDS Group Test Report Edition 2. Revised December 2001 (Edition 2 V1.0) Internet: The NSS Group. IDS Group Test Report Edition 2 [R]. Revised December 2001 (Edition 2 V1.0).
  • 7Intrusion detection working group. Intrusion detection message exchange format data model and extensible markup language (XML) document type definition[EB/OL].http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-06.txt, 2002-07-27.
  • 8Intrusion detection working group [EB/OL], http://www.ietf.org/html.charters/idwg-charter.html.
  • 9HUANG M Y, ROBERT J, THOMAS M. A large scale distributed intrusion detection framework based on attack strategy analysis[J]. Computer Networks 1999, 31:2465-2475.

共引文献1

同被引文献144

引证文献13

二级引证文献222

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部