期刊文献+

开发基于Snort的安全网管和实时检测系统

DEVELOPMENT OF A SNORT-BASED SECURITY NETWORK MANAGEMENT AND REAL-TIME INTRUSION DETECTION SYSTEM
下载PDF
导出
摘要 本系统基于网络入侵检测系统 (NIDS)模型 ,放置在比较重要的网段内 ,不停地监视网段中的各种数据包 .对可疑的数据包进行特征分析 .如果数据包与系统内置的特定规则吻合 ,入侵检测系统就会发出警报 .此外还提供部分安全网管功能 ,如数据流量统计和当前活动连接查看等 .本系统主要适用的环境是中小型企业网络或校园网 . This system based on the model of network-based intrusion detection system(NIDS) is posited at the important network parts, in which it constantly monitors various data packets and analyzes suspicious packets. If the characteristics in the packets coincide with the intrusion regulations built in the system, the NIDS will send out a warning. Furthermore, this system provides some functions of security network management, such as the statistics of data stream, the surveillance of present active connections, etc.. It is suitable to use this system at small-to-medium enterprises network or campus network.
出处 《北京师范大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第1期40-43,共4页 Journal of Beijing Normal University(Natural Science)
基金 国家计算机网络与信息安全管理中心预研课题基金资助项目 ( 2 0 0 1 研 3 0 13 )
关键词 入侵检测 安全网管 专家系统 intrusion detection security network management expert system
  • 相关文献

参考文献7

二级参考文献28

  • 1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
  • 2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
  • 3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
  • 4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
  • 5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
  • 6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
  • 7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
  • 8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
  • 9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989
  • 10[1]Snapp R S,Brentano James,Dias V G, Terrance L,Goan L,Todd Heberlein, Ho Che-Lin, Levitt N, Biswanath Mukherjee, Stephen E Smaha Tim Grance, Teal M and Mansur Doug.DIDS (Distributed Intrusion Detection System)-Motivation,Architecture, and An Early Prototype.Computer Security Laboratory Division of Computer Science University of California,Davis

共引文献127

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部