期刊文献+

基于特征分析的网络入侵检测技术比较 被引量:2

Analysis of Signature Based Network Intrusion Detection
下载PDF
导出
摘要 文章论述了基于特征分析的网络入侵检测技术的三种方法:模式匹配、协议分析和状态协议分析,分析了它们的工作原理。并通过包括SYNFlood、拒绝服务攻击、Nimda病毒和FTP缓冲区溢出等攻击实例详细说明他们不同的解决问题能力。 Signature based network intrusion detection becomes more and more important in network security.This paper introduces three analytical technology of signature based network intrusion detection:Pattern Matching,Protocol analysis and Stateful Protocol analysis.Their different abilities to detect the intrusions are discussed by several attack instances,including SYN flood,DOS,Nimda virus and FTP buffer overflow attack.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第32期161-163,166,共4页 Computer Engineering and Applications
基金 国家自然科学基金项目(编号:79990580 69931010 60172057 60071002 60072007) 国家863高科技发展计划项目(编号:2001AA144120)
关键词 入侵检测 协议分析 攻击特征 Intrusion Detection,Protocol Analysis,Attack Signature
  • 相关文献

参考文献6

  • 1Ivan Krsul,Eugene Spafford,Mahesh Tripunitara.Computer vulnerability analysis[R].Technical Report COAST TR98-07,COAST Laboratory,Purdue University,West Lafayette,IN, 1998-05.
  • 2Cisco System White Paper.The Science of Intrusion Detection System Attack Identification.http ://www.cisco.com/, 2002.
  • 3Karen Kent Frederick.Network Intrusion Detection Signatures.http:// online.securityfocus.com/, 2002.
  • 4Denning D E.An Intrusion Detection Model[J].IEEE Transaction on Software Engineering, 1987 ;2(2) :222-232.
  • 5T Ptacek,T Newsham.Insertion,Evasion,and Denim of Service:Eluding Network Intrusion Detection[R].Technical Report,Secure Networks, Inc, 1998-01.
  • 6Y Zhang,V Paxson.Detecting backdoors[C].In:gth USENIX Security Symposium, 2000.

同被引文献1

  • 1邹海明,余祥宣.计算机算法基础[M]华中理工大学出版社,1985.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部