期刊文献+

入侵检测系统评估技术研究 被引量:9

Study on Evaluation Techniques of Intrusion Detection Systems
下载PDF
导出
摘要 随着对入侵检测技术的深入研究和入侵检测产品的广泛应用,对入侵检测系统的评估技术的研究成为一个重要的研究领域.介绍了入侵检测评估的相关工作,讨论了对入侵检测系统进行评估时的主要评价指标,提出了一个入侵检测系统的评估系统.评估系统由主控模块统一控制,主控模块分别对流量控制模块和攻击模拟模块进行调度.对评估环境中所有的数据进行记录,作为评估模块的输入.该系统实现了网络流量和主机使用模拟、攻击模拟以及评估报告的生成等功能. With the deeply research on intrusion detection techniques and the widely use of intrusion detection products, the study of evaluation techniques of intrusion detection systems became important. In the paper, relative works of the evaluation of intrusion detection systems was introduced. The primary aspects of intrusion detection systems in an evaluation were discussed. An evaluation system for intrusion detection systems was proposed. In the system, a supervisor module controls the whole system. The supervisor module schedules the traffic control module and the attack emulation module. The data in the evaluation environment are recorded and input to the evaluation module. The functions such as emulation of network traffic and host usage, emulation of attacks and evaluation report generation are implemented.
出处 《小型微型计算机系统》 CSCD 北大核心 2005年第4期568-571,共4页 Journal of Chinese Computer Systems
基金 国家"八六三"计划CIMS主题(2003AA414210)资助 国家自然科学基金(60173051)资助 教育部优秀青年教师科研教学奖励计划资助 教育部高等学校博士学科点专项科研基金(20030145029)资助.
关键词 网络安全 入侵检测 评估 仿真 攻击 network security intrusion detection evaluation emulation attack
  • 相关文献

参考文献15

  • 1蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 2蔡忠闽,孙国基,卫军胡,管晓宏.入侵检测系统评估环境的设计与实现[J].系统仿真学报,2002,14(3):377-380. 被引量:25
  • 3Debar H, Dacier M, Wespi A. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999, 31(8);805-822.
  • 4Paxson V. Bro: A system for detecting network intruders in real-time[J] Computer Networks, 1999, 31(23): 2435-2463.
  • 5Manganaris S, Christensen M, Zerkle D, et al. Data mining analysis of RTID alarms [J]. Computer Networks, 2000, 34(4): 571-577.
  • 6Puketza N, Zhang K, Chung M, et al. A methodology for testing intrusion detection systems[J]. IEEE Transactions on Software Engineering, 1996, 22(10): 719-729.
  • 7Puketza N, Chung M, Olsson R A et al. A software platform for testing intrusion detection systems [J]. IEEE Software,1997, 14(5): 43-51.
  • 8Mchugh J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory[J]. ACM Transactions on Information and System Security, 2000, 3(4): 262-294.
  • 9Lippmann R, Fried D, Graf I et al. Evaluating intrusion detection systems: the 1998 DARPA Off-Line intrusion detection evaluation[C]. Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX), Hilton Head: IEEE. 2000, 2: 1012-1035.
  • 10Lippmann R, Haines J, Fried D et al. The 1999 DARPA OffLine intrusion detection evaluation [J]. Computer Networks,2000, 34(4): 579-595.

二级参考文献10

共引文献391

同被引文献134

引证文献9

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部