期刊文献+

基于Snort-wireless的分布式入侵检测系统研究与设计 被引量:19

Research and Design of Distributed Intrusion Detection System Based on Snort-wireless
下载PDF
导出
摘要 为了解决无线局域网存在的安全隐患,该文设计了基于Snort-wireless的分布式入侵检测模型。该模型利用开源、免费和易于扩展的Snort-wireless实现客户端的网络入侵检测引擎,利用VC++开发了控制中心,并且采用加密的TCP/IP协议实现客户端与控制中心之间的安全通信。同时,该模型符合入侵检测的标准框架CIDF,使该模型在性能、重用性以及可扩展性方面得到保证。 To solve the hidden danger of wireless local area network,a distributed intrusion detection model is designed.This model has achieved client network intrusion detection engine by utilizing snort-wireless which is full of open source,free and easy to expand,developed control centre by using VC++ and realized secure communication between client-side and control centre by employing encrypted TCP/IP protocol.Besides,this model meets up with the intrusion detection standard frame CIDF,which makes its function,reusability and scalability guaranteed.
出处 《信息网络安全》 2012年第2期23-26,33,共5页 Netinfo Security
关键词 无线局域网 分布式入侵检测 Snort-wireless TCP/IP协议 wireless local area network distributed intrusion detection Snort-wireless TCP/IP
  • 相关文献

参考文献11

  • 1Jaeseung Go, Kawangjo Kim. Wireless Authentication Protocol Preserving User Anonymity[J]. SCIS 2001, Japan, January 23-26, 2001.
  • 2M.G.Rahman, H.Imai. Security in wireless communication[C]. Wireless Personal Communications, Vol.22, No.2,August, 2002: 213-228.
  • 3M.J.Beller, L.F.Chang, Y.Yacobi. Security for personal communication services: public-key vs. private key approaches[C]. Proceedings of Third International Symposium on Personal, Indoor and Mobile Radio Communication(PIMRC' 92),IEEE Press, NewYork,1992,pp.26-31.
  • 4蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 5Northcutt S, Novak J. Network Intrusion Detection: An Analyst' s Handbook. 2nd Edition[C] Indianapolis (IN): New Riders Publishing, 2000.
  • 6侯方明.无线网络中入侵检测系统的研究与设计[M].山东:山东大学,2005.
  • 7Snort-wireless User's Guide. www.snort-wireless.org, 2012-01--05.
  • 8Sourcefire-Inc. Snort - the de facto standard for intrusion detection/ preventi0n[EB/OL], http://www.snort.org, 2012-01-05.
  • 9A. Lockhart, Snort wireless[EB/OL], http://www.snort-wireless.org, 2012-01-05.
  • 10杨武,方滨兴,云晓春,张宏莉.入侵检测系统中高效模式匹配算法的研究[J].计算机工程,2004,30(13):92-94. 被引量:23

二级参考文献13

  • 1Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 2刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 3Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 4Bian Zhaoqi,Pattern Recognition,1988年
  • 5边肇祺,模式识别,1988年
  • 6何华灿,人工智能导论,1988年
  • 7Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页
  • 8Roesch M. Snort-lightweight Intrusion Detection for Network. Seattle,Washington, USA: Proceedings of LISA99: 13th System Administration Conference, 1999-11
  • 9Commentz-Walter B. A String Matching Algorithm Fast on the Average. Proc. 6th International Colloquium on Automata, Languages,and Programming, 1979
  • 10Baeza-Yates R A. Improved String Searching. Software-Practice and Experience 19, 1989

共引文献390

同被引文献173

引证文献19

二级引证文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部