期刊文献+

基于入侵预防的网络入侵检测技术的研究 被引量:1

Study on Network Intrusion Detection Technology Based on Intrusion Prevention
在线阅读 下载PDF
导出
摘要 通过分析当前典型的基于特征的入侵检测系统的技术实现,阐述了入侵预防系统的实现要点,基于入侵预防结构的研究提出了一个通用的入侵预防系统,对入侵预防系统的实现原理作了初步探讨。 As the network continues to expand, the invasion and means of attack are more sophisticated and covert. Due to the inherent shortcomings of traditional intrusion detection system, it has been unable to adapt to the current network environment. Especially in the large-scale high-speed network environment, facing the attack of different characteristics, it shows inadequa- cies. Meanwhile, the intrusion detection system, as a basic framework of intrusion prevention system, has become the focus of researches made by domestic and foreign scholars. This article focuses on research on the structure of intrusion prevention system. In this article, the author puts forward a generic intrusion prevention system through in-depth analysis of current and typical intrusion detection system technology based on characteristics. The author also explains the points of Intrusion Prevention System's accomplishment and makes a preliminary discussion on the principle of intrusion prevention system's accomplishment.
出处 《华北科技学院学报》 2007年第2期87-90,共4页 Journal of North China Institute of Science and Technology
关键词 INTRUSION DETECTION INTRUSION PREVENTION 网络安全 NIDS 蠕虫病毒 Intrusion Detection Intrusion Prevention network safety NIDS Worm Virus
  • 相关文献

参考文献3

二级参考文献16

  • 1袁亚湘 孙文渝.最优化理论和方法[M].科学技术出版社,1997..
  • 2[1]Thomas H Ptacek, Timothy N Newsham.Insertion, Evasion,and Denial of Service:Eluding Network Intrusion Detection[J].Secure Networks,Inc.,1998,(1):3-17.
  • 3[2]Julia Allen,Alan Christie,et al.State of the Practice of Intrusion Detection Technologies[J].Technical Report,Networked Systems Survivability Program,2000,(1):47-83.
  • 4[3]Sandeep Kumar,Eugene H Spafford.A Pattern Matching Model for Misuse Intrusion Detection[C].REPORT in 17th National Computer Ecurity Conference,1994.3-9.
  • 5Kunt Mlkonomopouls A,Koeher M Second.Generation Image Coding Techniques[J].Proc of the IEEE, 1985 ;73(4) :549-575.
  • 6Nikos Grammalidis,Dimitfis Beletsiotis,Michael G.Strintzis.Sprite Generation and Coding in Mutiview Image Sequeces[J].IEEE Transaction on Circuits and Systems for Technology,2000; 10(2) :302-311.
  • 7Aljoseha Smolic,Thonms Sikora,Jens-Rainer Ohm.Long-Term Global Motion Estimation and Its Application for Sprite Coding,Content Description,and Segmentation[J].IEEE Transaction on Circuits and Systems for Technology, 1999;9(8) : 1227-1242.
  • 8SANDHU R S. Authentication, access control and intrusion detection[J]. IEEE Communications Magazine, 1994, 32(9): 40-48.
  • 9BASS T. Intrusion detection systems and multi-sensor data fusion[J]. Communications of the ACM, 2000, 43(4): 99-105.
  • 10KUMAR DAS. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks, 2000, 34(4): 579-595.

共引文献54

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部