期刊文献+

一种新的蜜网模型——BRHNS 被引量:3

New honeynets model——BRHNS
在线阅读 下载PDF
导出
摘要 在引入领域(Realm)概念的基础上,提出了一种新的蜜网模型——BRHNS(Based Realm Honeynets)。BRHNS模型利用Realm之间的协作性,提高了蜜网的工作效率,其中的入侵行为分析模块,用无监督聚类的方法对未知攻击的数据进行分类预处理,为以后提取入侵规则并将新的入侵规则添加到IDS规则库中打下了基础,进而提高了IDS的检测效率,降低了蜜网的工作量。通过交叉验证的方法进行实验,发现用无监督聚类算法能够很好地对攻击数据进行分类。 Based on citing Realm,a new Honeynets Model-BRHNS is presented.BRHNS makes use of cooperation between Realms,the efficiency of Honeynets is improved.In intrusion behavior analysis module,unknown attack data are classified by the unsupervised clustering,accordingly,prepared for extracting intrusion rules and adding the new rules to IDS rule-lib,consequently, the detection efficiency of IDS is improved and the workload of BRHNS is effectively reduced.Have performed experiments through cross-validate,we find it is effective to classify the attack data by the unsupervised clustering.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第7期139-143,共5页 Computer Engineering and Applications
基金 河北省自然科学基金(the Natural Science Foundation of Hebei Province of China under Grant No.F2004000133)
关键词 网络安全 诱捕 蜜网 领域 数据分析 network security entrapment honeynets Realm data analysis
  • 相关文献

参考文献10

  • 1DeLooze L L.Classification of computer attacks using a self-organizing map[C]//Proceedings of the 8th Colloquium for Information Systems Security Education.New York:IEEE Computer Society Press,2004:365-369.
  • 2CERT Coordination Center.Annual reports[EB/OL].[2005-10-11].http://www.cert.org/encyc_article/tocencyc.html.
  • 3Intrusion Detection Working Group.Intrusion detection message exchange format data model and EXtensible Markup Language(XML)document type definition[C]//Internet-Draft,2003:21-26.
  • 4Spitzner L.Honeypot-definitions and value of honeypots[EB/OL].[2003-05-29].http://www.tracking-hackers.com/papers/honeypots.html.
  • 5Honeynet Project.Know your enemy:Honeynets[EB/OL].[2005-05-12].http://www.honeynet.org/papers/honeynet/.
  • 6Sudaharan S,Dhammalapathi S,Rai S,et al.Knowledge sharing honeynets[C]//Proceedings from the Sixth Annual IEEE.New York:IEEE Computer Society Press,2005:240-243.
  • 7Yegneswaran V,Barford P,Paxson V.Using honeynets for Internet situational awareness[C]//Proceedings of the ACM/USENIX Fourth Workshop on Hot Topics in Networks(Hotnets Ⅳ),USA:ACM SIGCOMM HOTNETS,November,2005.
  • 8马艳丽,赵战生,黄轩.Honeypot-网络陷阱[J].计算机工程与应用,2003,39(4):162-165. 被引量:27
  • 9孙知信,杨加园,施良辉,王汝传.基于蜜罐的主动网络安全系统的研究与实现[J].电子与信息学报,2005,27(3):351-354. 被引量:11
  • 10KDD99.KDD99 cup dataset[EB/OL].[2005-11-02].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.

二级参考文献12

  • 1StehpenNorthcutt 余青霓 王晓程 周钢等译.网络入侵检测分析员手册[M].人民邮电出版社,2000..
  • 2The honeynet project. http://projeet.honeynct.org.
  • 3Lance Spitzner. Definitions and value of honeypots. Http://www.tracking-hackers.com/papers/honeypots.html, 2003,5.
  • 4Deception Toolkit. 2001. http://www.all.net/dtk/index.html.
  • 5Intrusion battleground evolves. http://www. nwfusion. com/reviews/2001/1008bg.html.
  • 6Review: Intrusion-detection products grow up. http://www.nwfusion.com/reviews/2001 / 1008rev. html.
  • 7The honeynet project: Know your enemy. 2002,12, http://www.linuxsecurity.com/teature stories/honevnet-review-kye.html.
  • 8Klug D. Honeypots and intrusion detection. 2000.9.13,www. san.org/in fosecfaq/honeypots.
  • 9Levine J, LaBella R, Owen H, Contis D, Culver B. The use of honeynets to detect exploited systems across large enterprise networks. Proc. of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY,June 2003,www. tracking-hackers.com/papers/gatech-honeynet.pdf.
  • 10Nathalie Weiler. Honeypots for distribute denial of service attacks. 2002, 10, htp://www. tik.ee.cthz.ch/-weiler/papers/wetice02.pdf.

共引文献35

同被引文献12

  • 1阮航,张梅琼,许榕生.第三代蜜网体系研究与分析[J].莆田学院学报,2006,13(5):54-57. 被引量:7
  • 2KDD99. KDD99 cupdataset[ EB/OL]. [ 2005 - 11 -02]. http:// kdd. its. uci. edu/databases/kddcup99/kddcup99, html.
  • 3Intrusion detection working group. Intrusion detection message ex- change format data model and EXtensible Markup Language (XML) document type definition[ R]. Internet-Draft, 2003:21 - 26.
  • 4RALAMBONDRAINY H. A conceptual version of the k-means algorithm[ J]. Pattern Recognition Letters, 1995, 16(11) : 1147 - 1157.
  • 5XU R, WUNSCH D. Clustering[M]. Hoboken, New Jersey, USA: John Wiley & Sons, 2009.
  • 6ZHANG S H, WANG R S, ZHANG X S. Identification of overlap- ping community structure in complex networks using fuzzy c-means clustering[ J]. Physica A, 2007, 374(1) : 483 -490.
  • 7孙吉贵,刘杰,赵连宇.聚类算法研究[J].软件学报,2008(1):48-61. 被引量:1107
  • 8肖宇,于剑.基于近邻传播算法的半监督聚类[J].软件学报,2008,19(11):2803-2813. 被引量:165
  • 9朱一帅,吴礼发.基于Sebek的蜜罐识别机制研究[J].信息技术,2009,33(1):83-86. 被引量:7
  • 10杨博,刘大有,LIU Jiming,金弟,马海宾.复杂网络聚类方法[J].软件学报,2009,20(1):54-66. 被引量:215

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部