期刊文献+

网络入侵检测中协同信息的安全传输(英文) 被引量:5

The Secure Transfer of the Cooperative Data in Network-Based Intrusion Detection System
下载PDF
导出
摘要 介绍了一个面向网络入侵检测协同信息的安全传输系统的设计与实现 ,它能够支持检测协同底层的数据传输并保证各协同站点间的信道安全 ,从而实现不同IDS之间的信息安全传输 ,为监测协同和安全追踪提供可靠传输服务 。 This paper discusses the design and implementation of a secure transfer of the cooperative data in a network based intrusion detection system. It makes the data transfer of security cooperation available, and ensures the security of all the communicative channels between different cooperation spots as well as supplying the base of ensuring IDS to accurately describe occurred security incidents to some extent. It provides reliable transfer services for security detection and security tracing that it becomes an indispensable part of the network based intrusion detection system.
作者 樊隽 金烨
出处 《南京师范大学学报(工程技术版)》 CAS 2002年第3期42-45,共4页 Journal of Nanjing Normal University(Engineering and Technology Edition)
基金 国家"863 -3 17-0 1-3 3 -99"课题资助~~
关键词 协同检测 IDXP XML TLS IDS cooperative detection, IDXP (Intrusion Detection Exchange Protocol), XML(Extensible Markup Language), TLS(Transport Layer Security), IDS(Intrusion Detection System)
  • 相关文献

参考文献6

  • 1[1]Gong Jian, Lu Sheng, Wang Qian. Computer Network Security Conspectus[ M]. First Edition. Published by Southeast University, Nanjing: Song Zengmin, 2002,1 ~ 290.
  • 2[2]Douglas E Comer,David L Stevens. Internetworking with TCP/IP Vol. Ⅲ :Client-Server Programming and Applications [M]. Second Edition, Prentice Hall Inc, 1998 ,1 ~403.
  • 3[3]Charlie Kaufman, Radia Perlman, Mike Speciner. Network Security: Private Communication in a Public World [ M ]. First Edition. Prentice Hall Inc, 1995,1 ~205.
  • 4[4]Liu Jianhang. The PKI based CA[Degree dissertation] [D]. Preserved in Nanjing: Southeast University. 1999.
  • 5[5]J Callas. OpenPGP Message Format[ DB/OL]. http://www. ietf. org, 1998/2002.
  • 6[6]B Feinstein. The Intrusion Detection Exchange Protocol (IDXP)[DB/OL]. http://www.ietf.org,2002/2002.

同被引文献14

  • 1谢洁锐,刘财兴,肖德琴,黄忠民.具有入侵检测功能的防火墙设计[J].计算机应用研究,2004,21(7):91-92. 被引量:12
  • 2沈雪石.论信息网络时代的国家安全[J].国防科技,2004,25(11):19-22. 被引量:8
  • 3孙知信,唐益慰,张伟,宫婧,王汝传.基于特征聚类的路由器异常流量过滤算法[J].软件学报,2006,17(2):295-304. 被引量:15
  • 4DouglasEComer,著.用TCP/IP进行网际互联第一卷:原理、协议与结构(第四版)[M].林瑶,蒋慧,译.北京:电子工业出版社,2001.
  • 5Jin - Tae Oh, Sang - Kil Park and etc, Detection of DDoS and IDS Evasion Attacks in a High - Speed Networks Environment [ J ]. International Journal of Computer Science and Network Security ,2007,7(6) , :124 - 131.
  • 6J Mirkovic, G Prier, P Reiher. Attacking DDoS at the Source [ C ]. IEEE International Conference on Network Protocols, Paris, France, November 2002.
  • 7D L Tennenhouse,J M Smith,W D Sincoskie,et al.A Survey of Active Networks Research[J].IEEE Communication Magazine,1997,35(1):80-86
  • 8L Peterson.NodeOS Interface Specificatio[R].2000.
  • 9(美)KeithE Strasssberg RichardJ Gondek GaryRollie 李昂 刘芳萍 杨旭 程鹏译.入侵检测实用手册[M].北京:机械工业出版社,2003(3).52-63.
  • 10(美)PaulE 范明译.proctor防火墙技术大全 [M].,..

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部