期刊文献+

入侵检测技术研究与系统设计 被引量:22

Research on the Intrusion Detection Technology and A System's Design
在线阅读 下载PDF
导出
摘要 入侵检测技术是一种主动保护网络资源免受黑客攻击的安全技术。入侵检测系统监控受保护系统的使用情况,发现不安全状态。它不仅帮助系统对付外来网络攻击,还可以查知内部合法用户的非法操作,扩展了系统管理员的安全管理能力。入侵检测为系统提供了实时保护,被认为是防火墙之后的第二道安全闸门。文章讲述了入侵检测技术的发展状况和关键技术,对现有系统进行了分类,并指出了该技术面临的一些挑战。最后提出了一种基于数据挖掘技术的具有自学习、自完善功能的入侵检测模型,可发现已知和未知的滥用入侵和异常入侵活动。 : Intrusion detection technology is an active security technology which can prevent the network components from being attacked by hackers.Intrusion detection system(IDS)monitors the usage of protected systems,detects insecure states.It can not only help coping with external attacks but also detects the misuse of the legitimate users.IDS extends the security administrator's ability.IDS offers real-time protection to systems and is considered as the second line of defence behind firewall.In this paper we introduce the development and key technologies of IDS,give a taxonomy of present systems,point out some challenges this technology faced.At last we present a datamining-based IDS model which has the functions of self-learning and self-completing,it can detect the known and novel intrusion activities.
出处 《计算机工程与应用》 CSCD 北大核心 2001年第16期1-4,共4页 Computer Engineering and Applications
基金 国家863高技术项目(编号:863-306-QN2000-5) 西安交通大学科学研究基金资助
关键词 计算机网络 入侵检测 系统设计 网络安全 黑客攻击 防火墙 : Intrusion detection,Data mining,Computer information security
  • 相关文献

参考文献9

  • 1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
  • 2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
  • 3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
  • 4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
  • 5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
  • 6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
  • 7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
  • 8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
  • 9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989

同被引文献83

引证文献22

二级引证文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部