期刊文献+

利用动态规则集和协议分析提高入侵检测效率 被引量:1

在线阅读 下载PDF
导出
摘要 入侵检测作为一种计算机系统安全监测手段,已经成为维护网络安全的主要技术之一。提出了一种新的模式匹配方法,即基于动态规则集和协议分析的模式匹配,它能缩短模式匹配的时间,极大地提高了入侵检测效率,为入侵检测理论研究和相关产品研发提供了参考。
出处 《电子技术应用》 北大核心 2006年第6期54-56,共3页 Application of Electronic Technique
  • 相关文献

参考文献3

二级参考文献11

  • 1S Forrest, AS Perelson, L Allen et al. Self-nonsdf discrimination in a computer. In: Proc of the 1994 IEEE Symp on Research in Security and Privacy. Los Alamitos, CA- IEEE Computer Society Press, 1994.
  • 2R Maxion, K M C Tan. Benchmarking anomaly-based detection systems. The 1st Int'l Conf on Dependable Systems & Networks,New York, USA, 2000.
  • 3Samuel Patton, William Yurcik, David Doss. An Achilles' heel in signature-based IDS: Squealing false positives in SNORT. The 4th Int'l Symp on Recent Advances in Intrusion Detection (RAID),University of California--Davis, USA, 2001.
  • 4Stephanle Forrest, Steven, A Hofmeyr et al. A sense of self for Unix processes. In: IEEE Symp on Security and Privacy.Oakland, California: IEEE Computer Society Press, 1996. 120--128.
  • 5Christina Warrender, Stephanie Forrest, Barak Pearlmutt.Detecting intrusions using system calls: Alternative data model.In: IEEE Symp on Security and Privacy. Oakland, California:IEEE Computer Society Press, 1999. 133--145.
  • 6Yah Qiao, Xie Weixin et al. An anomaly intrusion detection method based on HMM. Electronics Letters, 2002, 38(13) : 663~664.
  • 7H S Javitz, A Valdes. The SRI IDES statistical anomaly detector.In: Proc of the IEEE Symp on Research in Security and Privacy,Oakland, CA: IEEE Computer Society Press, 1991.
  • 8Steven A Hofmeyr. An immunological model of distributed detection and its application to ctmaputer security [Ph D dissertation]. Department of Computer Sciences, University of New Mexico, Albuquerque, NM, 1999.
  • 9Yan Qiao, Xie Weixin. A network IDS with low false positive rate. In: Proc of the Congress on Evolutionary Computation 2002. Honolulu, HI: IEEE Computer Society Press, 2002.
  • 10Stefan Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans on Information and System Security, 2000, 3(3): 186--205.

共引文献26

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部