期刊文献+

NIDS的改进研究 被引量:6

Research on NIDS Improvement
在线阅读 下载PDF
导出
摘要 作为网络安全体系的重要组成部分,IDS在现实中应用并不理想。该文分析了当前NIDS存在的“无效告警信息过多,对所处网络环境一无所知”这一根本问题,提出了对现有NIDS的改进思路,通过对所处网络状况的被动发现和分析,发现当前网络的环境信息,NIDS能更有针对性、更加有效地工作。 As an important component of the network security system, the IDS didn't work as well as expected in practice. This article analyzes the essential problem of the current NIDS, where there is too much invalid information and the NIDS almost know nothing about the network environment, which it is in. Besides, it also presents some ways to improve the NIDS. So the NIDS could discover and analyze the network environment information and work more particularly and effectively.
作者 隋毅 杜跃进
出处 《计算机工程》 CAS CSCD 北大核心 2007年第9期120-122,共3页 Computer Engineering
关键词 基于网络的入侵检测系统 入侵检测 被动网络发现 数据有效性 Network-based intrusion detection system(NIDS) Intrusion detection Passive network discovery Data validity
  • 相关文献

参考文献8

  • 1Anderson J P.Computer Security Threat Monitoring and Surveillance[R].Anderson Company,1980.
  • 2Denning D E.An Intrusion-detection Model[J].IEEE Transaction on Software Engineering,1987,13(2):222-232.
  • 32004年全国网络安全状况调查报告[R].北京:国家计算机网络应急技术处理协调中心,2005:10-22.
  • 4汪辉.NIDS误报、漏报的原因分析[N].中国计算机报(网络与通信),2003-09-01.
  • 5Roesch M.Snort 2 Lightweight Intrusion Detection for Networks[C]// Proceedings of the USENIX LISA'99 Conference.1999:229-238.
  • 6杜跃进.NIDS数据有效性的提高[R].北京:国家计算机网络应急技术处理协调中心,2005.
  • 7Roesch M.Passive Networks Discovery System & Asset-centric Security[R].Sourcefire Inc.,2004.
  • 8Stevens W R.TCP/IP Illustrated(Volume 1) The Protocols[M].Massachusetts:Addison-Wesley,1994.

同被引文献29

  • 1邱桔,陈若珊.一个基于原始套接字的Sniffer的设计与实现[J].计算机应用与软件,2006,23(4):117-119. 被引量:8
  • 2赵观军,丁宏,王泽.网络入侵检测系统中的频繁模式挖掘[J].计算机应用研究,2006,23(6):121-123. 被引量:1
  • 3Bai Yuebin,Kobayashi H. Intrusion detection systems: teehnology and development[C]//Kawada S. Proeeedings of the 17th International Conference on Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2003 : 710-715.
  • 4Rroesch M. Snort-lightweight Intrusion detection for networks [C]//Ricketts S, Birdie C, Isaksson E. Proceedings of the 13th LISA Conference. Washington: USENIX, 1999: 229-238.
  • 5Brugger S T. Data mining methods for network intrusion detection[EB/OL].http://www-static.cc. gatech. edu/ -guofei/reading/brugger-dmnid.pdf, 2004.
  • 6Agrawal R, Srikant R. Fast algorithms for mining association rules [C]//Boeea J B, Jarke M, Zaniolo C. Proceed- ings of the 20th International Conference on Very Large Databases. San Francisco: Morgan Kaufmann Publishers Inc, 1994:487-499.
  • 7Rakesh A, Ramakrishnan S. Mining sequential patterns [C]//Yu P S, Chen ALP. Proceedings of the 11th International Conference on Data Engineering. Taipei: IEEE Computer Society, 1995: 3-14.
  • 8Wu S, Manber U. A Fast Algorithm for Multi-pattern Searching[R]. Department of Computer Science, University of Arizona, Technical Report: TR-94-17, 1994.
  • 9Aho A V, Corasick M J. Efficient String Matching: An Aid to Bibliographic Search[J]. Communications of the ACM, 1975, 18(6): 333-340.
  • 10Anagnostakis K G, Antonatos S, Markatos E P, et al. E2xB: A Domain-specific String matching Algorithm for Intrusion Detection[C]//Proceedings of the 18th IFIP International Information Security Conference. Boston, USA: Springer, 2003: 217-228.

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部