期刊文献+

基于网络的攻击特征自动提取系统框架设计

Architecture Design of Network-based Attack Generation System Signature Automatic
原文传递
导出
摘要 文中按蠕虫发展进程研究各种情况下的特征自动提取系统,在对蠕虫特征自动提取技术进行综述的基础上,指出攻击特征自动提取技术存在的不足与发展趋势,并提出了基于网络的攻击特征自动提取系统框架。该框架具有模块清晰、低耦合、易扩展等特点。 The worm signature automatic generation systems are first serveyed according to the process of worm development, then the existed drawbacks and the development of the attack signature automatic generation technology are pointed out; and finally the architecture of network-based attack signature automatic generation system is proposed, which has such features as clear modules, low coupling and easy extension
出处 《信息安全与通信保密》 2009年第8期254-257,共4页 Information Security and Communications Privacy
关键词 特征自动提取 框架 入侵检测 蠕虫 signature automatic generation architecture intrusion detection worm
  • 相关文献

参考文献24

  • 1Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time[C] //Proceedings of the llth USENIX Security Symposium, Oakland:[s.n.],2002:149 167.
  • 2Venkataraman S, Blum A, Song D. Limits of Learning-based Signature Generation with Adversaries[C] // Proceedings of the 15th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego: [s.n.],2008.
  • 3王永全.入侵检测系统(IDS)的研究现状和展望[J].通信技术,2008,41(11):139-143. 被引量:22
  • 4田雪峰,钟求喜,苏金树.蠕虫早期检测系统研究[J].信息安全与通信保密,2005,27(7):238-242. 被引量:4
  • 5Kreibich C, Crowcroft J. Honeycomb -creating intrusion detection signatures using honeypots[J]. ACM SIGCOMM Computer Communications Review, 2004, 34(1): 51-56.
  • 6卿斯汉,文伟平,蒋建春,马恒太,刘雪飞.一种基于网状关联分析的网络蠕虫预警新方法[J].通信学报,2004,25(7):62-70. 被引量:40
  • 7徐晓萌,郭山清,徐秋亮.多态蠕虫的研究与进展[J].计算机科学与探索,2008,2(2):131-138. 被引量:7
  • 8Wang K, Stolfo S J. Anomalous payload-based worm detection and signature generation[C] // Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID), Seattle: [s.n.],2005.
  • 9Singh S, Estan C, Varghese G, et al. Automated worm fingerprinting[C] // Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), San Francisco: [s.n.],2004: 45- 60.
  • 10Kim H A, Karp B. Autograph: toward automated, distributed worm signature detection[C] //Proceedings of the 13th USENIX Security Symposium, San Diego: [s.n.], 2004: 271- 286.

二级参考文献148

  • 1卿斯汉,文伟平,蒋建春,马恒太,刘雪飞.一种基于网状关联分析的网络蠕虫预警新方法[J].通信学报,2004,25(7):62-70. 被引量:40
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3王永全.通信网络中犯罪行为的取证技术[J].电信科学,2006,22(6):63-66. 被引量:4
  • 4唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 5陈鸣钊 张志烈.模糊数学及其实用[M].南京:河海大学出版社,1993.176-178.
  • 6Anderson J P. Computer Security threat monitoring and surveillance[R]. Technology Report, James P Anderson Co., Fort Washington, Pennsylvanin, 1980.
  • 7Canndy J. Artificial neural network for misuse detection[J]. Proceeding of the 1998 National Information System Security Conference (NI-SSC' 98), 1998, (10): 5-8: 443-456.
  • 8Steven A H. An immunological model of distributed detectionand its application to computer security[D]. [s.l]: University of New Mexico, 1999.
  • 9Wenke Lee, Stolfo S J, Mok K W. A Data Mining Framework for Building Intrusion Detection Model[C]. Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999.
  • 10Pawlak Z. Vagueness and uneertainty-a rough set perspective [J]. Computational Intelligence, 1995, 11 (2): 227-232.

共引文献116

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部