期刊文献+

入侵检测系统评估仿真平台的研究 被引量:6

The Research of Simulation Platform for Testing Intrusion Detection System
下载PDF
导出
摘要 分析了入侵检测系统(IDS)测试评估的环境配置,提出了构建IDS测试仿真平台的步骤及实现技术,对测试评估中存在的一些问题作了相应的讨论,提出了解决办法. In this thesis, the environment configuration of Intrusion Detection System (IDS) testing evaluation are analyzed. The steps to build IDS evaluation platform at LAN are given and the technique to realize the IDS testing is explored. Some problems in the testing evaluation and methods to solve them are also discussed.
出处 《辽宁大学学报(自然科学版)》 CAS 2009年第1期49-51,共3页 Journal of Liaoning University:Natural Sciences Edition
关键词 入侵检测系统 仿真 攻击 环境配置 评估 测试平台 IDS emulation attack environment configuration evaluation testing platform.
  • 相关文献

参考文献15

二级参考文献91

共引文献77

同被引文献29

  • 1吕志军,金毅,赖海光,黄皓,谢立.DAPRA测试分析和IDS测试方法研究[J].计算机科学,2004,31(11):73-76. 被引量:4
  • 2方俊,郭雷,汪子强.一种改进的基于颜色-空间特征的图像检索方法[J].计算机工程与应用,2005,41(25):68-70. 被引量:11
  • 3The Shmoo Group. CaPture the CaPture the Flag Data [DB/OL]. [2006-04-11]. http: //cctf. shmoo, corn/.
  • 4PUKETZA N, ZHANG K, CHUNG M, et al. A Methodology for Testing Intrusion Detection Systems [ J ]. IEEE Transaction on Software Engineering, 1996, 22 (10) : 719-729.
  • 5RICHARD LIPPMANN, ROBERT K CUNNINGHAM. Results of the DARPA 1998 Off-Line Intrusion Detection Evaluation [R]. [S. l. ] : MIT Lincoln Laboratory, 1999.
  • 6MELL P, HU V, LIPPMANN R, et al. An Overview of Issues in Testing Intrusion Detection Systems [ R]. [ S. l. ] : National Institute of Standards and Technology, 2003.
  • 7TIAN Jun-feng, LIU Tao, JIAO Hong-qiang. Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems [ C ] //Electronic Commerce and Security, 2008 International Symposium on. Washington, DC, USA : IEEE Computer Society, 2008: 592-598.
  • 8DEBAR H, DACIER M, WESPI A, et al. An Experimentation Workbench for Intrusion Detection Systems [ R]. [ S. l. ] : IBM Zurich Research Laboratory, 1998.
  • 9SHIPLEY G. ISS RealSecure Pushes Past Newer IDS Players, Network Computing [ EB/OL]. (1999-05-17). http: //www. networkcomputing, com/1010/1010rl, html.
  • 10DEBAR H, DORIZZI B. An Application of a Recurrent Network to an Intrusion Detection System [ C ] //International Joint Conference on Neural Networks (IJCNN). Baltimore, MD, USA: Is. n. ], 1992: 478-483.

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部