期刊文献+

入侵检测系统评估方法综述 被引量:10

A Survey of the Approaches of Intrusion Detection System Evaluation
下载PDF
导出
摘要 文章对入侵检测系统评估方法的发展进行了综述,讨论了评估入侵检测系统的目的和难点,对90年代中期至今出现的各种评估方法进行了介绍。文章着重分析了NicholasJ.Puketza等人的工作和DARPA的评估工作,以及这些评估方法的不足,指出进行大规模分布式网络入侵检测系统的测试是目前研究的热点。 This paper is a summary of the development about intrusion detection system evaluation.With indicating the purpose and difficulty of intrusion detection system evaluation,this paper introduces several approaches of evaluation from1990's until now.Nicholas J.Puketza's work and DARPA's evaluation with their shortage are introduced in details.This paper also indicates that evaluation of intrusion detection system on large scale network is the trend today.
作者 汪洋 龚俭
出处 《计算机工程与应用》 CSCD 北大核心 2003年第32期171-173,共3页 Computer Engineering and Applications
基金 国家自然科学基金重点项目资助(编号:90104031)
关键词 入侵检测系统(IDS) 评估 测试平台 Intrusion Detection System(IDS),Evaluation,Test platform
  • 相关文献

参考文献13

  • 1罗嵘.入侵检测产品的评价指标[J].通信技术,2001,34(2):45-46. 被引量:4
  • 2龚俭,陆晟.大规模互联网络的入侵检测[J].东南大学学报(自然科学版),2002,32(3):325-330. 被引量:11
  • 3Nicholas J Puketza et al.A Methodology for Testing Intrusion Detection System[J].IEEE Trans on Software Engineering,1996;22(10): 720-728.
  • 4Richard Lippmann et al.1998 DARPA Intrusion Detection Evaluation Plans :Part 1[R].MIT Lincoln Laboratory, 1998.
  • 5Richard Lippmann,Robert K Cunningham et al.Results of the DARPA 1998 Offline Intrusion Detection Evaluation[R].MIT Lincoln Laboratory, 1999.
  • 6Richard Lippmann et al.Proposed 1999 DARPA Off-line Intrusion Detection Evaluation Plans[R].MIT Lincoln Laboratory, 1999.
  • 7J W Hains,Richard Lippmann et a1.1999 DARPA Intrusion Detection Evaluation:Design and Procedures[R].MIT Lincoln Laboratory,2001.
  • 8Richard Lippmann et al.The 1999 DARPA Off-Line Intrusion Detection Evaluation[R].Lincoln Laboratory MIT,244 Wood Street,Lexington,MA 02173-9108,2001.
  • 9Terrenee G Champion,Robert S Durst.Air Force Intrusion Detection System Evaluation Environment[R].Air Force Research Laimratory, 1999.
  • 10Dominique Alessandri.Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection System[R].Switzerland,IBM Research Laboratory Zurich,2000-10.

二级参考文献27

  • 1[1]Ranum M. Intrusion detection systems: expectations, ideals and realities. Computer Security Journal, 1 999; XIV (4): 25 ~ 45
  • 2[2]Hart R, Morgan D, Tran H. An introduction to automated intrusion detection approaches. Information Management & Computer Security,1999(2): 76 ~ 82
  • 3[3]Vigna G, Kemmerer R A. NetSTAT: a network - based intrusion detection system. Journal of Computer Security, 1999 (7): 37 ~ 71
  • 4[1]Jai Balasubramaniyan, Garcia-Fernandez Jose Omar, Isacoff David, et al. An ar chitecture for intrusion detection using autonomous agents[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 9805, 1998.
  • 5[2]Staniford-Chen S, Cheung S, Crawford R, et al. GrIDS-a graph-b ased intrusion detection system for large networks[A]. In: The 19th National Information Systems Security Conference[C].1996.http://seclab.cs.ucdavis. edu/papers/nissc96.pdf.
  • 6[3]Tung Brian. Common intrusion detection framework (CIDF)[EB/OL] . http://www.isi.edu/~brian/cidf/1999-09-10/2001-05-07.
  • 7[4]Zamboni Diego, Spafford E H. A prototype for a distributed intrusio n detection system[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 98-06,1998.
  • 8[5]Vigna G, Kemmerer R A. NetSTAT: a network-based intrusion detection system [J]. Journal of Computer Security,1999,7(1).http://ww w.cs.ucsb.edu/~rsg/pub/1999-vigna-kemmerer-jcs99.ps.gz.
  • 9[6]Bishop Matt, Northcutt Stephen. Executive summary[EB/OL]. http ://seclab.cs .ucdavis.edu/projects/idrds/summary.html, 1998-08-04/2001-05-07.
  • 10[7]Erlinger Michael, Staniford-Chen Stuart. Intrusion detection exchang e format (idwg)[EB/OL]. http://www.ietf.org/html.charters/idwg-chart er.html, 2001-04-30/2001-05-07.

共引文献12

同被引文献66

引证文献10

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部