期刊文献+

网络入侵检测方法研究

Study on Method of Network Intrusion Detection
下载PDF
导出
摘要 介绍了三种网络入侵检测系统的结构、原理和实现方法。 This paper presents the structure.principle and implementation of three new network intrusion deteefion system.
出处 《电脑学习》 2005年第4期4-6,共3页 Computer Study
关键词 计算机网络 入侵检测系统 防火墙 网络安全 入侵检测方法 实时专家系统 Intrusion Detection Expert System Database Immunology System
  • 相关文献

参考文献3

二级参考文献12

  • 1Heejin Jang, Sangwook Lim. Intruder tracing through dynamic extension of a security domain[J]. Journal of Network and Computer Applications, 2002, 25(2):69-91.
  • 2Anchor K P'Williams P D'Gunsch G H'et al.The computerdefense immune system:current and future research in intrusion detection [A].Proceedings of the 2002 Congress on Evolutionary Computation (CEC '02)[C].2002.1027- 1032.
  • 3Zhao J Z'Huang H K.An evolving intrusion detection system based on natural immune system [A].Proceedings of IEEE Region 10 Conference on Computers'Communications'Control and Power Engineering (TENCON '02) [C].2002.129-132.
  • 4Tarakanov A O'Skormin V A.Pattern recognition by immunocomputing[A].Proceedings of the 2002 Congress on Evolutionary Computation (CEC'02) [C].2002.938-943.
  • 5Jungwon K'Bentley P J.Towards an artificial immune system for network intrusion detection:an investigation of dynamic clonal selection [A].Proceedings of the 2002 Congress on Evolutionary Computation (CEC '02) [C].2002.1015-1020.
  • 6Cannady J, Harrell J. A Comparative analysis of current intrusion detection technologies. In: Proceedings of the 4th Technologies for Information Security Conference, Houston, 1996. 50~57
  • 7Anderson D, Frivold T, Valdes A. Next-generation intrusion detection expert system (NIDES): A summary. SRI International Technical Report SRI-CSL-95-07, 1995
  • 8Porras P A, Neumann P G. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 20th National Information Systems Security Conference, Maryland, 1997. 353~365
  • 9Sebring M, Shellhouse E, Hamma M E. Expert system in intrusion detection: A case study. In: Proceedings of the 11th National Computer Security Conference, Houston,1988. 74~81
  • 10Lindqvist U, Porras P A. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, 1999. 146~161

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部