期刊文献+

先进的入侵检测系统模型探析 被引量:4

Analysis of Advanced IDS Models
下载PDF
导出
摘要 随着黑客和病毒等对网络侵害手段花样的不断翻新,入侵检测系统(IDS)正在向着大规模分布式、智能化和全面的防御方案发展,在这里从一个入侵检测的通用模型开始,着重介绍和分析了大规模分布式IDS、基于ART-2神经网络的IDS和基于Honeynet的网络IDS,并给出了模型。 Alone with the varieties measures of the hiker and computer virus,IDS is advancing towards cosmically distributing,intelligentize and completely recover project.This text commences from a IDS currency model,emphasizing and analyzing the cosmically distributing IDS,the neural networks IDS based on ART-2 and the IDS based on Honey net,At last present their models.
出处 《舰船电子工程》 2008年第9期176-180,共5页 Ship Electronic Engineering
关键词 入侵检测 大规模分布式 ART-2神经网络 蜜罐 IDS cosmically distributing neural networks IDS based on ART-2 honeynet
  • 相关文献

参考文献7

二级参考文献20

  • 1[1]Bonifacio J M,Cansian A M,de Carvalho et al. Neural network applied in intrusion detection system[C].In:Proceedings of the 1998 IEEE International Joint Conference on Neural Networks, New Jersey: IEEE Piscataway, 1998: 205~210
  • 2[2]Zambomi D,Spafford E H.A framework and protocol for a distributed intrusion system[R].Technical Report , 98-06 , Purdue University,1998
  • 3[3]Wenke Lee,Salvatore J Stolfo. A Frameword for construction Features and Models for Intrusion Detection Systems[M].North Corolina State University,Columbia University, 2000
  • 4[4]Mark Crosbie,Prof Gene Spafford. Applying Genetic Programming to Intrusion Detection[M].Dept of Computer Sciences,Purdue University,2000
  • 5[5]Crosbie M,Spafford E H.Active defense of a computer system using autonomous agents[R].Technical Report,95-008,Purdue University,1995
  • 6[1]R Agrawal,R Srikant. Fast algorithms for mining association rules[C].In:Proc 20th Int′l Conf Very Large Data Bases(VLDB),1994:487~499
  • 7[2]Kryszkiewicz MRepresentative Association Rules[C].In:Proc of PAKDD98,Melbourne, Australia, LNAI 1394, Springer-Verlag, 1998:198~209
  • 8[3]Honeynet Project:Know Your Enemy-The Tools and Methodologies of the Script Kiddie.http:∥project.honeynet.org
  • 9[4]Honeynet Project:Know Your Enemy:Ⅱ-Tracking the blackhat′s moves.http: ∥project.honeynet.org
  • 10[5]Honeynet Project:Know Your Enemy:Honeyneta-What a Honeynet is,its value,how it works,and risk/issues involved.http:∥www.honeynet.org

共引文献14

同被引文献40

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部