期刊文献+

异常入侵检测方法的研究 被引量:2

A study in anomaly-based intrusion detection
下载PDF
导出
摘要 入侵检测技术作为保护网络安全的一种解决方案,越来越受到人们的重视。根据入侵检测原理的不同,入侵检测可分为误用检测和异常检测两种。分析了几种常用的异常入侵检测方法,最后讨论了现在入侵检测技术面临的问题以及今后的发展方向。 Intrusion detection technique,which as a kind of solution of protecting network security,has been paid more and more attention by people. According to the differences of intrusion detection theory,it includes misuse-based detection and anomaly-based intrusion. The article analyzed several kinds of methods commonly used in anomaly-based intrusion detection. At last the article discussed the problem that the detection technique faces and developing direction in the future.
作者 刘浩 李杰
出处 《信息技术》 2003年第12期63-65,共3页 Information Technology
关键词 入侵检测 异常检测 网络安全 intrusion detection anomaly detection network security
  • 相关文献

参考文献8

  • 1Denning D E. An intrusion-detection model[J]. IEEE Transaction on Software Engineering, 1987, SE-13:222-232.
  • 2Anup K.Ghosh. Aaron Schwartzbard. A Study in Using Neural Networks for Anomaly and Misuse Detection[J]. Proceedings of the 8th USENIX Security Symposium, 1999.8.
  • 3John McHugh. Intrusion and intrusion detection[J]. Springer-Verlag,2001.7.
  • 4金波,林家骏,王行愚.入侵检测技术评述[J].华东理工大学学报(自然科学版),2000,26(2):191-197. 被引量:41
  • 5徐菁,刘宝旭,许榕生.基于数据挖掘技术的入侵检测系统设计与实现[J].计算机工程,2002,28(6):9-10. 被引量:28
  • 6Jiawei Han,Micheline Kamber. Data Mining Concepts and Techniques[M].范明,孟小峰译.机械工业出版社,2002.
  • 7蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 8Stephanie Forrest,Steven A.Hofmeyr,Anil Somayaji,Thomas A.Longstaff. A sense of self for UNIX processes[J].IEEE, 1996.120-128.

二级参考文献18

  • 1[1]Wenke L, Salvatore S . Data Mining Approaches for lnrusion Detection. URL: http://www.cs.columbiaedu/~wenke/papers/usenix/ usenix.html, 2000-10-12
  • 2[2]Network Flight Recorder Inc.Network Flight Recorder http://www.nfr com
  • 3[3]Fayyad U , Piatetsky-Shapiro G , Smyth P . From Data Mining to Knowledge Discovery: An Overview. In Fayyad U . PiatetskyShapiro G , Smyth P, and Uthurusamy R, Editors, Adyances in Knowledge Discovery and Data Mining , AAAI/MIT Press,Cambridge, MA, 1996
  • 4[4]Lunt T. Detecting Intruders in Computer Systems. Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993
  • 5Puketza N,IEEE Software,1997年,14卷,5期,43页
  • 6Puketza N J,IEEE Transactionson Software Engineering,1996年,22卷,10期,719页
  • 7Chen S S,The 19th National Information Systems Security Conference,1996年
  • 8Fox K L,In Proceeding of13 th National Computer Security Conference,1990年
  • 9GB/T93 87.2 -1995 ,信息处理系统开放系统互连基本参考模型第 2部分 :安全体系结构 .
  • 10Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页

共引文献427

同被引文献72

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部