期刊文献+

一种基于入侵事件的检测分析技术 被引量:1

An Intrusion-Event-Based Detection Analysis Technology
在线阅读 下载PDF
导出
摘要 在本文中,我们针对目前入侵检测系统普遍存在的误报率高、报警信息冗余现象严重和对入侵表述能力不强的缺陷,提出了一种基于入侵事件的检测分析技术,详细描述了该技术所采用主要方法的设计思想,如多传感器数据融合以及基于模糊规则的原始报警信息鉴别等。实验结果表明,同现有入侵检测系统相比,该技术大大降低了系统的检测成本。 In this paper, we present a detection technology based on intrusion events in order to overcome the shortcomings of high false alert rate, serious redundant alerts and poor expression about the intrusion activities in today's intrusion detection systems. We describe the design ideas about the important methods used in this technology such as multi-sensor data fusion, raw alert distinguishment based on fuzzy rules and so on in detail. Experimental results show that compared with the existing intrusion detection systems, this technology can reduce the system test cost greatly.
作者 史亮 庄镇泉
出处 《计算机工程与科学》 CSCD 2005年第8期13-15,34,共4页 Computer Engineering & Science
基金 国家自然科学基金重点资助项目(90104030)
关键词 入侵检测 数据融合 模糊规则 入侵通报 intrusion detection data fusion fuzzy rule intrusion report
  • 相关文献

参考文献4

  • 1Peng Ning, Yun Cui, Douglas S Reeves. Constructing Attack Scenarios Through Correlation of Intrusion Alerts[A]. Proc of the 9th ACM Conf on Computer & Communications Security[C]. 2002.245-254.
  • 2J E Dickerson, J Juslin, O Koukousoula, et al. Fuzzy Intrusion Detection[A]. IFSA World Congress and 20th NAFIPS Int'l Conf[C]. 2001.
  • 3Richard P Lippmann, David J Fried, Isaac Graf, et al. Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation[A]. Proc of the 2000 DARPA Information Survivability Conf and Exposition. Vol 2[C].2000.
  • 4Snort[EB/OL]. http://www.snort.org, 2003-03.

同被引文献7

  • 1Ning P,Cui Y,Reeves D S.Constructing Attack Scenarios through Correlation of Intrusion Alerts[C].Proceedings of the 9^th ACM Conference on Computer & Communications Security,Washington D.C.,2002-11:245-254.
  • 2Valdes A,Skinner K.Probabilistic Alert Correlation[C].Proc.of the 4^th International Symposium on Recent Advances in Intrusion Detection,2001:54-68.
  • 3Dain O,Cunningham R.Fusing A Heterogeneous Alert Stream into Scenarios[C].Proc.of the ACM Workshop on Data Mining for Security Applications,2001-11:1-13.
  • 4Templeton S,Levit K.A Requires/Provides Model for Computer Attacks[C].Proc.of New Security Paradigms Workshop,2000-09:31-38.
  • 5Huang M Y.A Large Scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis[J].Computer Networks,1999,31 (23/24):2465-2475.
  • 6LLS_DDOS_1.0[Z].http://www.ll.mit.edu/IST/ideval/data/2000/LLS_DDOS_1.0.html.
  • 7DARPA2000[Z].http://www.ll.mit.edu/IST/ideval/data/2000/2000_data_index.html.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部