期刊文献+

网络入侵检测中的响应机制及应用

Response Mechanism and Its Application in NIDS
在线阅读 下载PDF
导出
摘要 在入侵检测中响应与检测同样重要 ,文章介绍了网络入侵检测中的响应机制 ,讨论了在传统入侵检测系统中使用主动响应的一些局限性 。 Intrusion response is as important as intrusion detection. This paper introduces the response mechanism of intrusion detection system and discusses its limitation. It also presents an intrusion detection system based on active response, and gives a method of response cost analysis.
作者 周竞 黄河
机构地区 武汉理工大学
出处 《交通与计算机》 2004年第5期54-57,共4页 Computer and Communications
关键词 网络入侵检测 入侵检测系统 响应机制 成本评估 主动 使用 文章 传统 局限性 方法 intrusion response active response response cost
  • 相关文献

参考文献4

  • 1Proctor Paul E.入侵检测实用手册.北京:中国电力出版社,2002(10):16-18;89-91
  • 2龚俭,陆晟.大规模互联网络的入侵检测[J].东南大学学报(自然科学版),2002,32(3):325-330. 被引量:11
  • 3Stephen Northcutt.深入剖析网络边界安全.北京:机械工业出版社,2003.412-414
  • 4Wenke Lee, Wei Fan, Matthew Miller, et al. Toword cost sensitive modeling for intrusion detection and response. Journal of Computer Security, 2002(10):2~22

二级参考文献24

  • 1[1]Jai Balasubramaniyan, Garcia-Fernandez Jose Omar, Isacoff David, et al. An ar chitecture for intrusion detection using autonomous agents[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 9805, 1998.
  • 2[2]Staniford-Chen S, Cheung S, Crawford R, et al. GrIDS-a graph-b ased intrusion detection system for large networks[A]. In: The 19th National Information Systems Security Conference[C].1996.http://seclab.cs.ucdavis. edu/papers/nissc96.pdf.
  • 3[3]Tung Brian. Common intrusion detection framework (CIDF)[EB/OL] . http://www.isi.edu/~brian/cidf/1999-09-10/2001-05-07.
  • 4[4]Zamboni Diego, Spafford E H. A prototype for a distributed intrusio n detection system[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 98-06,1998.
  • 5[5]Vigna G, Kemmerer R A. NetSTAT: a network-based intrusion detection system [J]. Journal of Computer Security,1999,7(1).http://ww w.cs.ucsb.edu/~rsg/pub/1999-vigna-kemmerer-jcs99.ps.gz.
  • 6[6]Bishop Matt, Northcutt Stephen. Executive summary[EB/OL]. http ://seclab.cs .ucdavis.edu/projects/idrds/summary.html, 1998-08-04/2001-05-07.
  • 7[7]Erlinger Michael, Staniford-Chen Stuart. Intrusion detection exchang e format (idwg)[EB/OL]. http://www.ietf.org/html.charters/idwg-chart er.html, 2001-04-30/2001-05-07.
  • 8[8]Eckmann S T, Vigna G, Kemmerer R A. STATL: an attack language for sta te-based intrusion detection[A]. In: Proc of the ACM Workshop on Int rusion Detection[C]. Athens, Greece, 2000. http://www.cs.ucsb.edu/~rsg/ pub/2000-eckmann-vigna-kemmerer-wids00.ps.gz.
  • 9[9]Vigna G, Eckmann S T, Kemmerer R A. Attack languages[A]. In: Proc of the IEEE Information Survivability Workshop[C]. Boston, MA, 2000. http://www.cs.ucsb.edu/~rsg/pub/2000-vigna-eckmann-kemmerer-attac klanguages.ps.gz.
  • 10[10]Renesse Robbert van, Minsky Yaron, Hayden Mark. A gossip-base d failure detection service[A]. In: Proc of Middleware'98[C]. England,1 998. http://www.cs.cornell.edu/Info/Projects/Spinglass/public-pdfs/Goss ip%2520Style%2520Failure.pdf.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部