期刊文献+

一种基于网络的入侵检测系统的研究与实现 被引量:6

Study and Implementation of a Net-based Intrusion Detection System
下载PDF
导出
摘要 网络入侵检测系统作为重要的安全工具已经成为研究的热点。本文首先介绍了IDS的基本概念及其组成和分类,然后重点介绍了一种基于网络的入侵检测系统的框架和具体实现,最后对IDS的当前研究情况和发展提出了看法。 NIDS (Network Intrusion Detection System) as an important security protection tool has become a hotspot for research. We introduce the basic concept of IDS and its primary components and common classification first, then we present the framework of a net-based IDS and its implementation in detail. We put forward our views about the current research of IDS and its prospect last.
出处 《微电子学与计算机》 CSCD 北大核心 2004年第6期129-131,134,共4页 Microelectronics & Computer
基金 国家863高技术发展研究计划(2001AA140213) 国家杰出青年基金(6970025) 国家自然科学基金(60243001)
关键词 安全 入侵检测 基于网络的入侵检测 Security, Intrusion Detection, Net-based Intrusion Detection
  • 相关文献

参考文献6

二级参考文献19

  • 1[1]Denning DE.An Intrusion Detection Model[J].IEEE Transaction on Software Engineering
  • 2[2]Terry Escamilla. Intrusion Detection[M].John Wiley &Sons Inc.New York, 1999
  • 3[3]S Forrest. Computer Immunology[J].Communications of ACM, 1997;40(10) :88-96
  • 4[4]A Somayaji,S Hofmeyr,S Forrest.Principles of a Computer Immune System[C].In: New Security Paradigms Workshop, ACM, 1998: 75-82
  • 5[5]S Forrest,A S Perelson,L Allen et al. Self-nonself discrimination in a computer[C].In:Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy,Los Alamitos,CA:IEEE Computer Society Press, 1994
  • 6[6]Kim J,Bentley P.The Artificial Immune Model for Network Intrusion Detection[C].In :7th European Conference on Intelligent Techniques and Soft Computing(EUFIT'99),Aachen,Germany
  • 7Debar, Hervé and Dacier et al. Towards a Taxonomy of Intrusion Detection Systems. Zurich, Switzerland, IBM Research, 1998(http: ∥www. zurich. ibm. com/).
  • 8T H Ptacek and T N Newsham. Insertion, evasion, and denial of service: Eluding Network Intrusion Detection.Technical report, Secure Networks Inc., January 1998.
  • 9http:∥www. phrack. org.
  • 10D Malkhi and M Reiter. Unreliable Intrusion Detection in Distributed Computations, Proc. of the 10th Computer Security Foundations Workshop, Rockport, MA, June 1997:116 ~ 124.

共引文献20

同被引文献39

引证文献6

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部