期刊文献+

基于流量分析的入侵检测系统研究 被引量:9

An intrusion detection system based on flow analysis
下载PDF
导出
摘要 随着网络技术发展,信息系统的安全性日益成为政府、企业及事业部门越来越关注的重大问题,保障信息系统的安全性已经成为迫切的需要.现有的网络安全系统多采用基于规则入侵检测技术,因而误报率较高;本文根据对边检入侵检测系统测量分析的基础上提出基于流量的边检入侵检测系统,通过量化分析来预测入侵和DDOS攻击,从而保证网络的安全性. Intrusion detection is a focus of current research. Anomaly detection techniques have been devised to address the limitations of misuse detection approaches for intrusion detection with the model of normal behaviors. A Self-Similar is a useful tool to model sequence information, an optimal modeling technique to minimize false-positive error while maximizing detection rate, but too complex and inefficient. This paper proposes an effective flow analysis intrusion detection system that improves the modeling time and performance by only considering the transition flows. Experimental results show that training with the proposed method is significantly faster than the conventional method trained with all data, without loss of detection performance.
出处 《天津理工学院学报》 2004年第2期86-88,共3页 Journal of Tianjin Institute of Technology
关键词 入侵检测 异常检测 流量分析 并行计算 intrusion detection anomaly detection flow analysis parallel computing
  • 相关文献

参考文献5

  • 1黄铠 徐志伟.可扩展并行计算技术、结构与编程[M].北京:机械工业出版社,2000..
  • 2Duda Hart. PC Magazine PC Tech (Denial-of-Service Attacks) [ EB/OL]. http://www. zdnet. com/pcmag/pctech/content/17/08/nt1708. 002. html.
  • 3Mcclelland, Rumelhart. CERT Advisory CA-1996-26 Denialof-Service Attack via ping[ EB/OL]. http://www. cert. org/advisories/CA-1996 -26. html.
  • 4Widro W,Steams. CERT Advisory CA-1997-28 IP Denial-ofService Attacks [ EB/OL]. http: //www. cert. org/advisories/CA-1997-28. html.
  • 5Leland W E, Taqqu M S, Willinger W, et al. On the selfsimilar nature of ethernet traffic ( extended version) [ J].IEEE/ACM Trans. on Networking, 1994,2( 1 ): 1-15.

共引文献23

同被引文献18

  • 1简文晖,叶锦青.浅析网络信息安全的技术防范策略[J].武警工程学院学报,2006,22(6):53-56. 被引量:1
  • 2ABRY P,VEITCH D.Wavelet analysis of long-range-dependent traffic[J].IEEE Trans.Information Theory,1998,44(1):2-15.
  • 3BRY P,BARANIUK R,FLANDRIN P,et al.Multiscale nature of network traffic[J].IEEE Signal Processing Magazine,2002,19(3):28-46.
  • 4ALLEN R L,MILLS D W.Signal Analysis:Time,Frequency,Scale,and Structure[J].Wileyand Sons,New Jersey,2004.
  • 5CHANG R K C.Defending Against Flooding-Based Distributed Denial-of-Service Attacks:A Tutorial[J].IEEE Communications,2002(10).
  • 6FEINSTEIN B D.The Intrusion Detection Messageexchange Format[EB/OL].(2005-07-31) draft-ietf-idwg-idmef-xml-14.txt.
  • 7(美)迪尔(Deal,R.A).Cisco路由器防火墙安全[M].陈克忠,译.北京:人民邮电出版社,2006.
  • 8Protocol Anomaly Detection for Network-based Intrusion Detection[EB/OL].[2014-02-21].http://www.sans.org/rr/intrusion/anomaly.php.
  • 9周丽娟.校园网络的安全策略研究[J].长春师范学院学报(自然科学版),2009,28(3):81-84. 被引量:6
  • 10陈鹏,吕卫锋,单征.基于网络的入侵检测方法研究[J].计算机工程与应用,2001,37(19):44-48. 被引量:35

引证文献9

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部