期刊文献+

计算机网络入侵检测系统发展趋势 被引量:7

Development Trend of Intrusion Detection System for Computer Networks
下载PDF
导出
摘要 回顾了计算机网络入侵检测系统发展的过程,从入侵检测系统的类型划分这个角度,描述了基于主机和基于网络两种数据源、基于滥用和基于异常两种检测方法,并对各自的优缺点进行了比较。从体系结构、数据源和数据分析技术三个方面对入侵检测系统的当前研究现状进行了详细的论述。最后,对入侵检测系统的未来发展方向进行了讨论。 An overview of IDS's historical development is presented. After that, host-based IDS and network-based IDS are discussed and misuse detection and anomaly detection are compared.A review of architectures, data sources and data analysis techniques of IDS is given. Finally, the IDS in the future are predicted.
出处 《计算机测量与控制》 CSCD 2004年第4期301-304,共4页 Computer Measurement &Control
关键词 计算机网络 入侵检测系统 网络安全 体系结构 数据源 信息基础设施 信息安全 network security intrusion detection system architecture data sources misuse detection anomaly detection
  • 相关文献

参考文献8

  • 1Bace R. Intrusion detection[M]. Macmillan Technical Publishing,2000.
  • 2Mukherjee B, Heberlein, Levitt. Network intrusion detection[J].IEEE Network, 1994,8(3):26-41.
  • 3Jackson. NADIR: a prototype system for detecting network and file system abuse[A].Proceedings of the 7th European Conference on Information Systems[C],1992.
  • 4Lee W,Stolfo S J, Mok K W. Mining audit data to build intrusion detection Models[A].Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining[C], New York, 1998,
  • 5Spafford E H, Zamboni D.Intrusion detection using autonomous agents[J].Computer Networks, 2000,34:547-570.
  • 6Heady R,Luger G,Maccabe A.The architecture of a network level intrusion detection system[R].Technical Report CS90-20,University of New Mexico,1990.
  • 7Hochberg, Jackson, Stallings, et al. NADIR: an automated system for detecting network intrusions and misuse[J]. Computers and Security,1993,12(3):253-248.
  • 8Dasgupta D,Gonzalez F A. An immuno gnetic approach to intrusion detection[R]. CS Technical Report (No. CS-01-001), The University of Memphis.2001.

同被引文献58

引证文献7

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部