期刊文献+

基于网络的入侵检测方法研究 被引量:35

Network-based Intrusion Detection Approach:A Survey
在线阅读 下载PDF
导出
摘要 综述了基于网络的入侵检测系统(NetworkBasedIntrusionDetectionSystem,NIDS)研究方面的一些最新的工作,分析了NIDS的体系结构、NIDS的典型技术,并着重论述了大型网络入侵检测所面临的问题,包括NIDS体系结构的可扩展性、基于知识的NIDS、NIDS的海量数据处理技术及其进一步的研究方向。 This is a review paper on recent works about Network-based Intrusion Detection System.A summary of the technologies considered in the literatures is presented.This paper mainly focuses on such research topics as the NIDS architecture,the typical technologies of NIDS,the scalability of NIDS,knowledge-based NIDS and massive data processing in NIDS.Research directions and open problems in this area are also discussed.
出处 《计算机工程与应用》 CSCD 北大核心 2001年第19期44-48,60,共6页 Computer Engineering and Applications
基金 国家重点基础研究发展规划项目编号:G1999032709
关键词 入侵检测系统 网络安全 防火墙 INTERNET 计算机网络 IDS,Intelligent Agent,Astringency of Formal System,Data Fusion,Data mining.
  • 相关文献

参考文献13

  • 1[1]D E Denning. An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2) :222-2
  • 2[2]G Vigna,R A Kemmerer. NetSTAT:A Network-based Intrusion Detection Approach[C].Proceedings of the 14th Annual Computer Security Conference,Scottsdale,Arizona, 1998.12
  • 3[3]S Kumar. Classification and Detection of Computer Intrusions[D].PhD Dissertation. Department of Computer Sciences,PurdueUniversity,1995
  • 4[4]J Balasubramaniyan,J Omar Garcia-Fernandez,D Isacoff et al.An Architecture for Intrusion Detection using Autonomous Agents[R].Department of Computer Sciences,Purdue University,Coast TR 98-05,1998
  • 5[5]Frincke D,Don Tobin,Jesse McConnell et al.A Framework for Cooperative Intrusion Detection[C].Proceedings of the 21 st National Information Systems Security Conference,1998.10:361-373
  • 6[6]W Lee,S J Stolfo,K Mok. A Data Mining Framework for Building Intrusion Detection Models[C].Proceedings of the IEEE Symposium on Security and Privacy, 1999
  • 7[7]Guy Helmer,Johnny S K Wong,Vasant Honavar et al.Intelligent Agents for Intrusion Detection[C].Proceedings,IEEE Information Technology Conference, Syracuse, NY, 1998.9:121-124
  • 8[8]M Conner,C Patel,M Little. Genetic Algorithm/Artificial Life Evolution of Security Vulnerability Agents[C].Army Research Laboratory Federal Laboratory 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program(ATIRP),1999.2
  • 9[9]Jacobs S,D Dumas,W Booth et al.Security Architecture for Intelligent Agent Based Vulnerability Analysis[C].Proceedings:3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution Research Program, College Park, MD.37,1999.2: 447-451
  • 10[10]Barrett Michael,W Booth,M Conner et al. Intelligent Agents System Requirements and Architecture[R].Report to ATIRP,1998.10

同被引文献104

引证文献35

二级引证文献160

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部