期刊文献+

审计系统中基于状态机的实时关联分析子系统研究与实现

Research and Implementation of Real-time Association Analyzing Subsystem Based on State Machine in Audit System
在线阅读 下载PDF
导出
摘要 网络集中安全审计系统的研究与应用已经成为国内外研究的热点。在海量的网络事件中,准确实时地检测分析入侵安全事件的类别并自动响应是集中审计系统实现中关键的技术,也是最大的难点。本文研究了基于状态机的实时关联分析子系统的实现技术,其中详细分析了攻击场景描述、场景库和分析引擎的实现方法。 The research and application of network concentration security audit system is becoming the focus of world. It is pivotal and difficult to accurately and timely detect the categories of intrusion events, This paper mainly researches the design and realization of real time association analyzing subsystem based on state machine, analyses the description of attack scene and the realization of scene database and analysis engine in detail.
作者 陈世强
机构地区 湖北民族学院
出处 《计算机与现代化》 2006年第6期94-96,109,共4页 Computer and Modernization
关键词 审计系统 关联分析 状态机 场景库 实时 audlt system association analyzing state machine scene database real-time
  • 相关文献

参考文献6

二级参考文献20

  • 1Comer D E 林瑶 等.用TCP/IP进行网际互联:原理、协议和体系结构[M].北京:电子工业出版社,2000..
  • 2邓瑛 杨凡 等.分布式拒绝服务黑客攻击技术分析及防范措施.军事系统工程理论创新与实践[M].北京:军事科学出版社,2000..
  • 3[1]anderson J P.Computer Security Threat Monitoring and Surveillance Fort Washington,James P.Anderson Co.,1980
  • 4[2]Matt B,Christopher W,Jeremy F.Goal-oriented Auditing and Logging IEEE Transactions on Computing Systems,1996
  • 5[3]Price K E.Hostbased Misuse Detection and Conventional Operating Systems audit Data Collection[Masters Thesis].Purdue University 1997-12
  • 6[4]Giovanni V,Inspect:A Lightweight Distributed Approach to Autom-ated Audit Trail Analysis.http://citeseer.nj.nec.com/276699.html
  • 7[5]Daniels T E,Spafford E H.A Network Audit System for Hostbasted Intrusion Detecti(NASHID)in Linux.Purdue University,2000
  • 8[1]Naji Habra, Baudouin Le Charilier, Isabelle Mathieu, Preliminary Report onAdvanced Security Audit Trail Analysis on Unix (ASAX also called SAT -X ). http://www. info. fundp. ac. be/~ amo/publications. html.
  • 9[2]CCITT Recommendation X. 740 INFORMATION TECHNOLOGY - OPENSYSTEM INTEERCON NECTION- SYSTEM MANAGEMENT: SECURITYAUDIT TRAIL FUNCTION.
  • 10[3]Wenke Lee and Salvatore J. Stolfo, Data Mining Approaches for IntrusionDetection, Computer Science Department, Columbia University.

共引文献97

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部