期刊文献+

基于攻击描述语言的IDS基准测试技术研究 被引量:2

Research on Technology of IDS Benchmark Test Based on Attack Description Language
在线阅读 下载PDF
导出
摘要 从最早利用协议分析仪发送攻击特征,采用黑客工具,到网络攻击数据的录播重放,IDS测试方法和工具随着入侵检测技术和网络攻击的发展而不断发展。论文提出了一种新的基准测试技术,它基于全新设计的网络攻击描述语言,对各种网络攻击进行统一规范的描述形成测试脚本库,然后通过模拟攻击机和牺牲主机的一体化结构,产生各种网络攻击会话,从而达到测试的目的。 From sending signatures,using hacking tools,to replaying the traffics of network attacks,the methodologies and tools of IDS test are developing along with the developing of intrusion detection and hacking,This paper proposes a new approach for IDS benchmark test,which is based on a new network attack description language,This approach can descript all the network attack activities in an unified way to form the database of test scripts,Furthermore,based on the united architecture simulating attack host and sacrificed host,it realizes the real creation of network attack sessions.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第33期1-4,共4页 Computer Engineering and Applications
基金 国家信息关防与网络安全可持续发展计划资助(编号:2002-研-3-014)
关键词 入侵检测系统 基准测试 攻击描述语言 一体化结构 Intrusion Detection System,benchmark test,attack description language,united architecture
  • 相关文献

参考文献9

  • 1MIT Lincoln Laboratory.DARPA Intrusion Detection Evaluation.http: //www.ll.mit .edu/IST/ideval/.
  • 2Richard P Lippmann,David J Fried,Isaac Graf et al.Evaluating Intrusion Detection Systems:the 1995 DARPA Off-Line Intrusion Detection Evaluation[C].In:Proceedings of the 2000 DARPA Information Survivability Conference and Exposition(DISCEX),Vol.2,IEEE Press, 2000-01.
  • 3Terrence G Champion ,Robert S Durst.Air Force Intrusion Detection System Evaluation Environment.http ://www.raid-symposium.org/ raid99/ papers.
  • 4DENMAC SYSTEM,INC.Network Based Intrusion Detection.http:// www.denmac.com.
  • 5D Song,G Shaffer,M Undy.Nidsbench-A Network Intrusion Detection System Test Suite,Second International Workshop on Recent Advances in Intrusion Detection ( RAID ).http ://www.anzen.com/research/nid- sbench/nidsbenchslides/nidsbench-slides.html, 1999-09.
  • 6BLADE Software.Discover IDS Informer.http://www.blade-software. com/IDS Informer.htm.
  • 7Peter Mell,Vincent Hu,Richard et al.An Overview of Issues in Testing Intrusion Detection Systems.http ://csrc.nist.gov/publications/ nistir/ nistir-7007.pdf.
  • 8Benchmarking network IDS..Joh2.http://www.robertgraham.com/op-ed/ jolt2/.
  • 9Thomas H Ptacek,Timothy N Newsham.Insertion,Evasion,and Denial of Service :Eluding Network Intrusion Detection.Secure Networks,Inc. 1998-01.

同被引文献12

  • 1吕志军,金毅,赖海光,黄皓,谢立.DAPRA测试分析和IDS测试方法研究[J].计算机科学,2004,31(11):73-76. 被引量:4
  • 2PHILLIPS C,SWILER L P.A graph-based system for network-vulnerability analysis[C]// Proceeding of the Workshop on New Security Paradigms.1998:71-79.
  • 3SHEYNER O M.Scenario graphs and attack graphs[D].Pittsburgh:Carnegie Mellon University,2004.
  • 4RITCHEY R W,AMMANN P.Using model checking to analyze network vulnerabilities[C]// Proceedings of the 2000 IEEE Symposium on Security and Privacy.2000:156-165.
  • 5ROSCHKE S,CHENG F,MEINEL C.A new alert correlation algorithm based on attack graph[C]//Proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems (CISIS'11).2011:58-67.
  • 6ECKMANN S T,VIGNA G,KEMMERER R A.STATL:an attack language for state-based intrusion detection[J].Journal of Computer Security,2002,10(1/2):71-103.
  • 7徐立.基于攻击图模型的网络安全分析方法研究[D].上海:上海交通大学,2010.
  • 8ROSCHKE S,CHENG F,MEINEL C.Using vulnerability information and attack graphs for intrusion detection[C]//2010 6th International Conference on Information Assurance and Security.2010:68-73.
  • 9YILMAZ E.Survey of intrusion detection and attack description languages based on monitoring program behavior[EB/OL].[2013-03-01].http://ww2.cs.fsu.edu/ ~ yilmaz/AreaExam/AreaExam.ppt.
  • 10ECKMANN S T,VIGNA G,KEMMERER R A.STATL definition[D].Santa Barbara:University of California Santa Barbara,2001.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部