期刊文献+

智能互助的入侵检测系统 被引量:1

A Smart Intrusion Detection System with the Ability to Seek Help
下载PDF
导出
摘要 介绍了入侵检测系统中所采用的异常检测技术及其优缺点,同时介绍了克服此缺点的一些模型,在分析此类模型的基础上,提出了一种新的思想:建立一个检测系统的通信标准,从而使不同的系统能够互相通信,并形成一个检测系统的网络,以强化防范措施。 In this paper the anomaly detection technology was described. The merits and demerits of these models were also discussed. To solve deficiencies of these models, some new models were brought forward and analyzed. Based on our novel idea, if a communication standard between detection systems is established, these systems can communicate each other and constitute a network of detection system. Therefore, the system are strengthened to prevent from intrusion.
出处 《江南大学学报(自然科学版)》 CAS 2003年第3期265-267,共3页 Joural of Jiangnan University (Natural Science Edition) 
关键词 入侵检测 异常检测 分布式拒绝服务 代理 安全 intrusion detection anomaly detection DDoS agent network security
  • 相关文献

参考文献5

二级参考文献25

  • 12.Smaha S E.Haystack An intrusion detection system.In IEEE Four- th Aerospace Computer Security Applications Conference,USA:Or- lando,FL,Dec.1988
  • 23.Levitt K N,Heberlein L T,Mukherjee B.A method to detect intru- sive activity in a networked environment.In 14th National Computer Security Conference,Washington,DC,USA:Oct.1991:362-371
  • 34.Pagurek B,White T,Bieszczad A.A Network modeling for manage- ment applications using intelligent mobile agents.Journal of Network and Systems Management,September 1999;7(3)
  • 45.Vigna G,Fuggetta A,Picco G P.Understanding code mobility.IEEE TRANSACTIONS On Software Engineering,1998;24(5):342-361
  • 56.Picco G P,Baldi M.Evaluating the tradeoffs of mobile code design paradigms in network management applications.In the 20th Interna- tional Conference on Software Engineering ICSE'98,Kyoto,Japan: IEEE CS Press,April 1998
  • 67.Lane T,Brodley C E.Temporal sequence learning and data reduc- tion for anomaly detection.In Proceedings of the Fifth ACM Confer- ence on Computer and Communications Security,1998:150-158
  • 78.Bishop M,Dilger M.Checking for race conditions in file accesses. Computing Systems,Spring 1996;9(2):131-152
  • 8王启智(译),实用UNIX和Internet安全技术,1999年
  • 9刘有才,模糊专家系统原理与设计,1995年
  • 10吴亚非(译),计算机安全的技术与方法,1994年

共引文献84

同被引文献4

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部