期刊文献+

入侵检测技术的不对称模型

The Asymmetry Model of Intrusion Detection Technology
下载PDF
导出
摘要 自20世纪80年代初Denning关于入侵检测的开创性研究工作至今,各种具体的入侵检测技术大量涌现,但是还缺少一种实用的理论模型能够解释各种技术方法的本质原理机制。本文从信息不对称角度,提出入侵检测的不对称模型。并试图说明各种具体技术方法的检测性能都是入侵检测双方信息不对称性的外在体现。为此,引入不对称指数的概念,并讨论入侵检测双方性能与不对称指数的关系。 Various invasion detection technologies have appeared since Denning started his research work on the invasion detection in the early 1980s. But we still lack a practical theoretical model to explain their techniques principle. This article, based on the information asymmetry, poses asymmetry models used to detect the invasions, and tried to make out that any specific technical detections are the exhibition of the asymmetry of the invasion information of the both sides. Therefore, the concept of asymmetry index was introduced, and the relationship between the asymmetric indexes of the both sides of invasion detection is discussed.
机构地区 桂林工学院
出处 《宁波广播电视大学学报》 2006年第4期117-119,共3页 Journal of Ningbo Radio & TV University
关键词 入侵检测 不对称性 不对称指数 Intrusion Detection Asymmetric Asymmetric Index
  • 相关文献

参考文献3

二级参考文献18

  • 1RebeccaGurleyBace著 陈明奇 吴秋新 杨晓兵译.入侵检测[M].北京:人民邮电出版社,2001..
  • 2J P Anderson.Computer security threat monitoring and surveillance[R].Technical report.Fort Washington,Pennsylvania:James P Anderson Company,1980.4
  • 3Dorothy E Denning.An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering,1987.2; 13 (2):222 ~232
  • 4D.Alessandri,C.Cachin,M.Dacier al.,etc "Towards a Taxonomy of Intrusion Detection Systems and Attacks" Computer Science (# 93412)2001.9.3
  • 5钟力,王建国,王江波.入侵检测的发展方向.2001年中国信息协会信息安全专业委员会年会
  • 6入侵检测管理员手册[M].北京:人民邮电出版社,2000
  • 7Dominique Alessandri,"Using Rule-Based Activity Descriptions to Evaluate Intrusion Detection Systems," http://link.springer.de/link/service/series/0558/bibs/1907/19070183.htm,2000,183 ~ 96
  • 8James P.Anderson,"Computer Security Threat Monitoring and Surveillance," James P.Anderson Co.Fort Washington,PA,April 1980
  • 9F.B.Cohen,Protection and Security on the Information Superhighway,New York:John Wiley & Sons,1995
  • 10National Institute of Standards and Technology (NIST),"Computer Security Resource Center (CSRC)," http://csrc.nist.gov

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部