期刊文献+

基于计算机网络的入侵检测系统的研究 被引量:8

Research of Intrusion Detection System Based on Computer Network
下载PDF
导出
摘要 随着计算机和网络技术的快速扩展,网络安全已经成为现代计算机系统面临的最重要的问题之一。入侵检测系统作为不同于防火墙和防病毒软件的主动防御的最后一道防线,能够用于监控网络或计算机系统的动态行为特征,并采取主动防御措施来阻止入侵的发生。本文从IDS的基本概念、入侵检测方法和入侵检测算法等几方面对入侵检测当前研究现状进行了详细的论述,并对入侵检测系统的未来发展趋势进行了讨论。这为今后深入IDS的研究提供了必要的技术依据和发展方向。 With the rapid development of computer and network techniques, computer &network security has been one of the keys to the modern computer system. Intrusion detection system (IDS) is differ from the firewall and the anti-virus software, because it can monitor the dynamic behavior character of the network or the computer system, and take active recovery measure to hold back intrusion. Research actuality of the IDS has been detailedly discussed from concept, means and algorithm of IDS, and put forward to IDS trend in the future. At the same time, it also provides essential technology and development to farther research IDS.
出处 《微计算机信息》 北大核心 2006年第12X期34-36,70,共4页 Control & Automation
基金 内蒙古自治区科委基金资助(2005N3001)
关键词 算机网络 入侵检测 正常行为 异常行为 误报率 漏报率 computer network,intrusion detection, normal behavior,anomaly behavior,false positive rate,false negative rate
  • 相关文献

参考文献15

二级参考文献81

  • 1连洁,王杰.入侵检测系统在涉密计算机中的应用研究[J].微计算机信息,2005,21(10X):24-26. 被引量:8
  • 2MarcusGoncalves.防火墙技术指南[M].北京:机械工业出版社,2000..
  • 3Forrest S., Hofmeyr S.A., Somayaji A., Longstaff T.A.. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1996, 120~128
  • 4Lee Wenke, Xiang Dong. Information-theoretic measures for anomaly detection. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA, 2001, 130~143
  • 5Lane T., Brodley C.E.. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the 5th ACM Conference on Computer & Communication Security, San Francisco, California, USA, 1998, 295~331
  • 6Goldman R.P., Geib C.W., Miller C.A.. A new model of plan recognition. In: Proceedings of the 1999 Conference on Uncertainty in Artificial Intelligence, Stockholm, Sweden, 1999, 245~254
  • 7Charniak E., Goldman R.. A Bayesian model of plan recognition. Artificial Intelligence, Elsevier Science Publishers. 1993, 64(1): 53~79
  • 8Albrecht R., Zukerman R., Nicholson A., Bud A.. Towards a Bayesian model for keyhole plan recognition in large domains. In: Proceedings of the 6th International Conference on User Modeling. Sardinia, Italy, 1997, 365~376
  • 9Wrn A., Stenborg O.. Recognizing the plans of a replanning user. In: Proceedings of the IJCAI95 Workshop on The Next Generation of Plan Recognition Systems: Challenges for and Insight from Related Areas of AI. Montreal, Canada, 1995, 113~118
  • 10Nicholson A.E., Brady J.M.. Dynamic belief networks for discrete monitoring. IEEE Transactions on Systems, Man, and Cybernetics, 1994, 24(11): 1593~1610

共引文献302

同被引文献32

引证文献8

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部