期刊文献+

基于贝叶斯理论的入侵检测评测方法研究

Research of IDS Evaluation Method Based on Bayesian Theory
下载PDF
导出
摘要 提出一种基于贝叶斯理论的入侵检测系统(IDS)评测方法,设计并建立了一套较完善的入侵检测系统评测体系.确立了用于评测IDS的4个重要指标:功能指标、性能指标、安全性指标和用户可用性指标.量化分析了一些主要测试指标,并利用概率树模拟入侵及检测过程.结果表明,该方法能在系统的检测率和误报率间找到最佳的阈值平衡点. A fresh IDS evaluation method based on Bayesian theory was proposed, and a more perfect Intrusion Detection System Evaluation System was thus designed and constructed. Meanwhile, the four important indices to evaluate IDS, that is, function index, performance index, security index and user availability index, were established. The specific quantitative analysis about some of the major indices was made, moreover, the process of intrusion and detection was simulated with probability tree. The results show that the presented method can find the optimal balance between the detection rate and false alarm rate of the system.
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期925-929,共5页 Journal of Jilin University:Science Edition
基金 信息产业部电子信息产业发展项目基金(批准号:信部运[2004]125号)
关键词 网络安全 入侵检测 评测 见叶斯理论 概率树 攻击 测试环境 network security intrusion detection evaluation Bayesian theory probability tree attack testenvironment
  • 相关文献

参考文献5

二级参考文献32

  • 1房至一,黄孟陬,张震.基于集中控制的Web Cache体系结构[J].吉林大学学报(理学版),2004,42(3):387-392. 被引量:1
  • 2Raul Mahajan, Sally Floyd. Controlling high-bandwidth flows at the congested router[EB/OL]. http://www.cs.washington.edu/homes/ratul/red-pd/paper_icnp.pdf, 2000-11/2003- 02
  • 3Vern Paxson. An analysis of using reflectors to defeat DoS traceback.Ausus,t2000[EB/OL].ftp://ftp.ee.lbl.gov/.vp-reflectors.txt, 2000-8/2003-2
  • 4Venkatachary Srinivasan, Geroge Varhese. Faster IP lookups using controlled prefix expansion[EB/BL]. http://ccrc.wustl.edu/-cheenu/papers/filucpe.ps,1998-02/2003-02
  • 5Tennenhouse D L, Smith J M, Sincoskie W D, et al . A survey of active network research[J]. IEEE Communications Magazine, 1997,35(1):80-86
  • 6InmonWH.数据仓库[M].北京:机械工业出版社,2003..
  • 7Baratloo A, Singh N, Tsai T. Transparent Run-time Defense against Statck Smashing Attacks [ C/OL]//Proceedings ofthe 2000 USENIX Annum Technical Conference. [ 2004-07-13 ]. http ://www. research. avayalabs. com/project/libsafe/doc/usenix00/paper. html.
  • 8Northcutt S 陈曙辉 李化 译.深入剖析网络边界安全[M].北京:机械工业出版社,2003..
  • 9Baumann R, Plattner C. White Paper: Honeypots [ M/OL]. [ 2002-02-26 ]. http ://www. inf. ethz. ch/personal/plattner/pdf/whitepaper. pdf.
  • 10Heberlein L. A Network Security Monitor [ C]//Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy. Oakland: IEEE Computer Society Press, 1990: 296-303.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部