期刊文献+

基于蜜罐的入侵检测系统的设计与实现 被引量:13

Design and implementation of intrusion detection system based on honeypot
下载PDF
导出
摘要 传统的入侵检测系统无法识别未知的攻击,提出在入侵检测系统中引入蜜罐技术来弥补其不足,并设计和实现了一个基于人工神经网络的入侵检测系统HoneypotIDS。该系统应用感知器学习方法构建FDM检测模型和SDM检测模型两阶段检测模型来对入侵行为进行检测。其中,FDM检测模型用于划分正常类和攻击类,SDM检测模型则在此基础上对一些具体的攻击类型进行识别。最后,设计实验对HoneypotIDS的检测能力进行了测试。实验结果表明,HoneypotIDS对被监控网络中的入侵行为具有较好的检测率和较低的误报率。 The traditional IDS(intrusion detection system) can not identify the unknown attacks.Therefore,this paper introduced honeypot technique into the IDS.It desigaed a intrusion detection system based on ANN(artificial neural network).It constructed the system contained FDM detection model and SDM detection model by using perceptron learning method.FDM was used to distinguish the attack class from the normal class,while the other focused on detecting some main types of attacks.At last,an experiment was to test detection ability of HoneypotIDS.The results of the experiment show that HoneypotIDS has a better detection rate and a lower false positive rate for the intrusion activities in the monitored network.
作者 汪洁 杨柳
出处 《计算机应用研究》 CSCD 北大核心 2012年第2期667-671,共5页 Application Research of Computers
基金 中南大学自由探索计划资助项目(2011QNZT035)
关键词 入侵检测 蜜罐 感知器 intrusion detection honeypot perception
  • 相关文献

参考文献10

  • 1SUN Wen-chen, CHEN Yi-ming. A rough set approach for automatic key attributes identification of zero-day polymorphic worm[ J]. Expert Systems with Applications,2009,36(3 ) :4672-4679.
  • 2张新宇,卿斯汉,李琦,李大治,何朝辉.一种基于本地网络的蠕虫协同检测方法[J].软件学报,2007,18(2):412-421. 被引量:25
  • 3肖枫涛,胡华平,刘波,陈新.HPBR:用于蠕虫检测的主机报文行为评级模型[J].通信学报,2008,29(10):108-116. 被引量:5
  • 4PERDISCI R, DAGON D, LEE W, et al. Misleading worm signature generators using deliberate noise injection[ C]//Proc of 2006 IEEE Symposium on Security and Privacy. Washington DC : IEEE Computer Society, 2006 : 17- 31.
  • 5陈博,方滨兴,云晓春.分布式蠕虫检测和遏制方法的研究[J].通信学报,2007,28(2):9-16. 被引量:12
  • 6WANG Jie,WANG Jian-xin, CHEN Jian-er,et al. An automated sig- nature generation approach for polymorphic worm based on color cod- ing[ C ]//Proc of IEEE International Conference on Communications. Washington DC : IEEE Computer Society, 2009 : 1- 6.
  • 7向继,高能,荆继武.一种基于门限签名的可靠蠕虫特征产生系统[J].计算机学报,2009,32(5):930-939. 被引量:4
  • 8STANIFORD S, PAXSON V, WEAVER N. How to own the Internet in your spare time[ C]//Proc of the llth USENIX Security Symposi- um. Berkeley : USENIX, 2002 : 149-167.
  • 9MANNA P K, CHEN S, RANKA S. Inside the permutation-scanning worms: propagation modeling and analysis [ J]. IEEE/AGM Trans on Networking,2010,8(3) :858-870.
  • 10STEPHENSON B, SIKDAR B. A quasi-species approach for model- ing the dynamics of polymorphic worm [ C ]//Proc of the 25th IEEE International Conference on Computer Communications. Washington DC : IEEE Computer Society, 2006 : 1-12.

二级参考文献63

共引文献35

同被引文献94

引证文献13

二级引证文献68

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部