期刊文献+

入侵检测系统中的快速多模式匹配算法 被引量:7

A FASTER MULTI-PATTERN MATCHING ALGORITHM IN INTRUSION DETECTION SYSTEM
下载PDF
导出
摘要 网络入侵检测系统常常依赖于精确的模式匹配技术 ,依赖于算法的选择、实现以及使用频率。这种模式匹配技术可能成为入侵检测系统的瓶颈 ,为了跟上快速增长的网络速度和网络流量 ,Snort(开放源代码的网络入侵检测系统 )中采用了快速多模式匹配算法 。 Network Intrusion Detection Systems(NIDS)often rely on exact pattern matching techniques.Depending on the choice of algorithm,implementation and the frequency with which it is applied,this pattern matching may become a performan ce bottleneck.To keep up with increasing network speeds and traffic,Snort takes advantage of advanced string matching algorithms.In this paper,it is described t hat a faster multi-pattern matching algorithm and its effectiveness.
出处 《计算机应用与软件》 CSCD 北大核心 2004年第2期84-86,共3页 Computer Applications and Software
关键词 网络安全 入侵检测系统 快速多模式匹配算法 模式匹配 算法选择 开放源代码 规则集 Network secureIntrusion detectionAlgorithmPatter n matchingMulti-pattern algorithm
  • 相关文献

同被引文献29

  • 1谢小红.校园网下的入侵检测方法[J].石油天然气学报,2003,25(z2):173-174. 被引量:2
  • 2罗自立,薛质,李建华.基于Linux环境的主机日志自动审计技术[J].信息安全与通信保密,2004,26(7):43-45. 被引量:2
  • 3陈一航,薛质.一种针对网络入侵检测系统的字符串匹配算法[J].计算机应用与软件,2005,22(4):5-6. 被引量:4
  • 4Fumio Mizoguchi.Anomaly Detection Using Visualization and Machine Learning[C].In:IEEE 9th International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterpfises,Gaithersburg, Maryland, 2000-03.
  • 5SHAN Zheng,CHEN Peng,XU Ke et al.A Network State Based In trusion Detection Model[C].In:2001 International Conference on Computer Networks and Mobile Computing.Beijing, CHINA, 2001- 10.
  • 6Koral Ilgun,Richard A Kemmerer,Phillip A Porras.State Transition Analysls:A Rule-Based Intrusion Detection Approach[J].IEEE Transactions on Software Engineering, 1995 ;21 (3) : 181-199.
  • 7Nittida Nuansri ,Samar Singh ,Tharam S Dillon.A Process State-Transition Analysis and its Application to Intrusion Detection[C].In: 15th Annual Computer Security Applications Conference,Phoenix, Arizona, 1999-12.
  • 8Nong Ye, Syed Masum Emran, Xiangyang Li et al.Statistical Process Control for Computer Intrusion Detection[C].In:DARPA Information Survivability Conference & Exposition Anaheim,California,2001;1(1).
  • 9JHA S, HASSAN M. Building agents for rule-based intrusion detection system[J]. Computer Communication, 2002, 25(15): 1366-1373.
  • 10张云勇 刘锦德.移动Agent技术[M].北京:清华大学出版社,2004..

引证文献7

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部