期刊文献+

入侵检测中的快速过滤算法 被引量:4

Faster Filter Algorithms in Intrusion Detection System
下载PDF
导出
摘要 入侵检测系统是近年来发展迅速的一种网络安全技术。但是,随着计算机网络向着高速、宽带的方向发展,检测引擎越来越成为性能的瓶颈。如果检测速度不能跟上网络流量,就会丢包并发生漏报。这除了采用更高速的专业硬件来解决外,包过滤算法也有非常重要的作用。高速的过滤算法有助于过滤掉大量无关的信息,从而极大地提高入侵检测系统的性能。 Intrusion detection system is a rapidly developed network security technology. But as network has developed toward rapid speed and broadband, detect engine becomes a performance bottleneck. If network is overload, IDS will lose attack messages. So packet filter algorithms are very important to solve this problem. A good algorithm can filter much no useful message and improve IDS's performance.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第16期109-110,共2页 Computer Engineering
关键词 入侵检测系统 网络入侵检测系统 BM算法 AC算法 IDS NIDS Boyer-Moore algorithms Aho-Corasick algorithms
  • 相关文献

参考文献5

  • 1Boyer R S, Moore J S. A Fast String Searching Algorithm.,Communications of the ACM, 1977,(20).
  • 2Horspool R N, Practical Fast Searching in Strings. Software Practice and Experience, 1980 (10).
  • 3Kim,Kim Y.A Fast Multiple String-pattem Matching Algorithm.Proceedings of the 17th AoM/laom Intemational Conference on Computer Science, 1999-05.
  • 4Knuth D, Morris J, Pratt V. Fast Pattem Matching in Strings. SIAM Journal on Computing, 1977, (6).
  • 5Gusfield D. Algorithms on Strings, Trees, and Sequences. Computer Science and Computational Biology, 1997.

同被引文献26

  • 1潘登,张大方,谢鲲,张继.一种基于折半层次搜索的包分类算法[J].计算机应用,2009,29(2):500-502. 被引量:3
  • 2杨余旺,杨静宇,孙亚民.分布式拒绝服务攻击的实现机理及其防御研究[J].计算机工程与设计,2004,25(5):657-660. 被引量:15
  • 3蔡晓妍,戴冠中,杨黎斌.改进的多模式字符串匹配算法[J].计算机应用,2007,27(6):1415-1417. 被引量:11
  • 4Boyer R S, Moore J S. A fast string searching algorithm [ J ]. Communications of the ACM, 1977, 20 ( 10 ) : 761-772.
  • 5韩东海,王超,李群编.网络安全技术概论[M].北京:国防工业出版社,2003.
  • 6[1]Tidwell T,Larson R,Fitch K,et at.Modeling Internet Attacks[A]. Proceedings of The 2001 IEEE Workshop on Information Assurance and Security[C].2001.54-59.
  • 7[2]Guy Gary Helmer. Intelligent Muiti-Angent System for Intrusion Detection and Countermeasures [D].PhD thesis, Iowa State University,2000.
  • 8[3]Denning A. An intrusion Detection Mmodel[J]. IEEE Transaction on Software Engineering, 1987,13(2):222-232.
  • 9HASAN J,CADAMBI S,VENKATTA.Chisel:A storage efficient,collion free hash-based network architecture[EB/OL].[2009 -12-12].www.cse.msu.edu/ ~ alexliu/courses/825Spring2008/lectures/chisel.pdf.
  • 10KUMAR S,TURNER J,CROWLEY P.Peacock hashing:deterministic and updatable hashing for high performance networking[C] // INFOCOM:27th IEEE Conference on Computer Communications.Washington,DC:IEEE,2001:502-1003.

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部