期刊文献+

入侵检测产品的评价研究 被引量:5

Study on the Evaluation of Intrusion Detection Products
在线阅读 下载PDF
导出
摘要 文章首先介绍了现有的入侵检测产品类型。针对目前市场上入侵检测产品鱼龙混杂的局面,本文构建了一个评价入侵检测产品的指标体系,并举例说明了模糊综合评价法在产品评价中的应用。应用此方法,企业的网络管理人员可根据本单位的实际需求状况作出理性的购买决策,以保证企业网络的安全运行。 In this paper, the current IDS types are first introduced. Then an index system is proposed to evaluate IDS products in the market. The method of Fuzzy Judgment is applied to evaluate IDS products with running an example. Using this method, the network administrator can make rational decision to ensure the safety operation of company's network according to the actual situation.
作者 陈晓梅
出处 《微电子学与计算机》 CSCD 北大核心 2005年第9期74-76,共3页 Microelectronics & Computer
关键词 入侵检测 产品 评价 模糊综合评价法 权重 IDS, Products, Evaluation, Fuzzy judgment method, Weight
  • 相关文献

参考文献5

二级参考文献13

  • 1[1]Ranum M. Intrusion detection systems: expectations, ideals and realities. Computer Security Journal, 1 999; XIV (4): 25 ~ 45
  • 2[2]Hart R, Morgan D, Tran H. An introduction to automated intrusion detection approaches. Information Management & Computer Security,1999(2): 76 ~ 82
  • 3[3]Vigna G, Kemmerer R A. NetSTAT: a network - based intrusion detection system. Journal of Computer Security, 1999 (7): 37 ~ 71
  • 4Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 5刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 6Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 7Bian Zhaoqi,Pattern Recognition,1988年
  • 8边肇祺,模式识别,1988年
  • 9何华灿,人工智能导论,1988年
  • 10Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页

共引文献403

同被引文献28

  • 1廖海宁.高效可扩展路由器命令行接口的实现[J].计算机工程,2004,30(19):173-175. 被引量:3
  • 2苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. 被引量:17
  • 3Chowalit Tirmagonsutibout,Pirawat Watanapongse. A novel approach to process- based intrusion detection system using read sequence finite state automata with inbound byte proler[C]//ICEP2003. Spain: Catalonia, 2003.
  • 4Saaty T A.The analytic hierarchy process.NewYork:McGrawHill,1980.
  • 5The tcpdump program.2007.http://www.tcpdump.org.
  • 6Xen Project.Xen Interface Manual.March 2007.http://www.cl.cam.ac.uk/Research/SR.G/notes/xen/readmes/interface/interface/interface.html.
  • 7David Cisnall.The definitive guide to the Xen hypervisor.PRENTICE HALL.2007.
  • 8Tim Abels,Puneet Dhawan,Balasubramanian Chandrasekaran.An Overview of Xen Virtualization.March 2007.http://www.dell.com/downloads/global/power/ps3q05-20050191-Abels.pdf.
  • 9Whitaker A J.Building Robust Systems with Virtual Machine Monitors.Univ.Washington Generals Examination,2004.
  • 10Syslog configuration.http://www.die.net/doc/linux/man/man5/syslog.conf.5.html.

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部