期刊文献+

分布式安全审计系统设计与实现 被引量:18

Design and implementation of distributed security audit system
在线阅读 下载PDF
导出
摘要 安全审计愈来愈受关注,但是大多数分布式安全审计系统仍不成熟。首先阐述了分布式安全审计的概念。然后介绍了一个基于数据挖掘技术的分布式分层的安全审计系统的功能及体系结构设计,并详细阐述了XML日志格式、多模式串匹配、模糊聚类和关联安全规则等系统设计实现中采用的一些重要技术。提高了检测效率和发现未知攻击的能力,增强了系统的安全性,可以有效的对整个系统进行安全级别的评估。 Security audit catch more and more attentions. But most distributed security audit systems are immature. Firstly, the notion of distributed security audit system is introduced. Then a distributed multilayered security audit system based on data mining techniques is proposed. The design of system functionalities and architecture is emphasized. At the same time, some important implementation techniques are specified, including the XML log format, multi-string matching, fuzzy aggregation and association security rules. The ability of detecting efficiency and discovering unknown attack is improved, the security of the system is enhanced, and evaluating the security level of the whole system is availability.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第4期811-813,共3页 Computer Engineering and Design
关键词 安全审计 分布式 入侵检测 数据挖掘 日志 security audit distributed intrusion detection data mining log
  • 相关文献

参考文献10

二级参考文献37

  • 1成睿奇,田盛丰,黄厚宽.基于分布式智能代理的入侵检测方法研究[J].计算机工程与设计,2004,25(3):374-378. 被引量:2
  • 2潘金贵等编译.现代计算机常用数据结构和算法[M].南京大学出版社,1992.610~614.
  • 3[1]Naji Habra, Baudouin Le Charilier, Isabelle Mathieu, Preliminary Report onAdvanced Security Audit Trail Analysis on Unix (ASAX also called SAT -X ). http://www. info. fundp. ac. be/~ amo/publications. html.
  • 4[2]CCITT Recommendation X. 740 INFORMATION TECHNOLOGY - OPENSYSTEM INTEERCON NECTION- SYSTEM MANAGEMENT: SECURITYAUDIT TRAIL FUNCTION.
  • 5[3]Wenke Lee and Salvatore J. Stolfo, Data Mining Approaches for IntrusionDetection, Computer Science Department, Columbia University.
  • 6[4]David R. Saffort, Douglas Lee, and David K. Hess, The TAMU SecurityPackage: An Ongoing Response to Intemet Intruders in an AcademicEnvironment, Supercomputer Center,Texas A&M University.
  • 7[5]Giovinna Vigna, Diparti, Inspect :A Lightweight Distributed Approach to Au-tomated Audit Trail Analysis.
  • 8[6]Matt Bishop, Christopher Wee, Jeremy Frank,Goal Oriented Auditing andLogging, Department of C omputer Science, University of California at Davis.
  • 9吴焱.入侵者检测[M].北京:电子工业出版社,1999..
  • 10www.sun.com

共引文献75

同被引文献87

引证文献18

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部