期刊文献+

基于报文头与报文内容的入侵检测分析方法

The Intrusion Detection Method of Message Head and Message Content
在线阅读 下载PDF
导出
摘要 针对网络入侵与攻击行为特点,提出基于报文头和报文内容特征匹配的入侵行业分析方法,实验证明能有效提高匹配效率和准确率,具有一定的实际意义. Considering the characteristics of network intrusion and attacks made on the message head and message content,this essay is to put forward some feature matching method of analysis.It is proved to effectively improve the matching efficiency and accuracy and has some practical significance.
出处 《湘南学院学报》 2011年第5期46-50,共5页 Journal of Xiangnan University
基金 湖南省教育厅重点资助项目(2006A006)
关键词 入侵检测 报文 分析方法 内容匹配 intrusion detection message analysis content match
  • 相关文献

参考文献7

  • 1N Dukkipati, N McKeown. Why Flow- Completion Time is the Right Metric for Congestion Control[J]. ACM SIGCOMM Computer Commu- nication Review, 2006, (36) :59 - 62.
  • 2Y Chang, M Tsai, Y Chung. Multi - Character Processor Array for Pattern Matching in Network Intrusion Detection System[J]. 22nd Inter- national Conference on Advanced Information Networking and Applications, 2008.
  • 3田俊峰,赵卫东,杜瑞忠,蔡红云.新的入侵检测数据融合模型——IDSFP[J].通信学报,2006,27(6):115-120. 被引量:15
  • 4Anukool Lakhina. Mining Anomalies Using Traftic Feature Distributions [ J ]. Philadelphia, Pennsylvania, USA. SIGCOMM' 05, 2005, (8) : 22 - 26.
  • 5S Antonatos, K G Anagnostakis, E P Markatos. Generating realistic workloads for network intrusion detection systems[ J]. ACM Workshop on Software and Performance, 2004:207 - 215.
  • 6H Lu, K Zheng, B Liu, X Zhang, Y Liu. A Memory - Efficient Parallel String Matching Architecture for High- Speed Intrusion Detection [J]. IEEE Journal on Selected Areas in Communications, 2006,24:1793 - 1804.
  • 7诸葛建伟,王大为,陈昱,叶志远,邹维.基于D-S证据理论的网络异常检测方法[J].软件学报,2006,17(3):463-471. 被引量:56

二级参考文献14

  • 1李昆仑,黄厚宽,田盛丰,刘振鹏,刘志强.模糊多类支持向量机及其在入侵检测中的应用[J].计算机学报,2005,28(2):274-280. 被引量:49
  • 2肖云,韩崇昭,郑庆华,王清.一种基于多分类支持向量机的网络入侵检测方法[J].西安交通大学学报,2005,39(6):562-565. 被引量:13
  • 3CUPPEN F.Managing alerts in a multi-intrusion detection environment[A].Proceedings of the 17th Annual Computer Security Applications Conference[C].2001.22-32.
  • 4BASS T.Intrusion detection systems and multisensor data fusion[J].Communications of the ACM,2000,43(4):99-105.
  • 5BASS T,ROAD S.Multisensor data fusion for next generation distributed intrusion detection systems[A].IRIS National Symposium Draft[C].1999.24-27.
  • 6VAIDES A,SKINNER K.Probabilistic alert correlation[A].Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection[C].2001.54-68.
  • 7BURROGHS D J,WILSON L F,CYBENKO G V.Analysis of distributed intrusion detection systems using bayesian methods[A].Proceedings of IEEE International Performance Computing and Communication Conference[C].2002.239-334.
  • 8CURRY D,DEBAR H.Intrusion detection message exchange format data model and extensible markup language (XML) document type definition[A].Internet-Draft[C].2003.21-26.
  • 9蓝金辉,马宝华,蓝天,周兆英.D-S证据理论数据融合方法在目标识别中的应用[J].清华大学学报(自然科学版),2001,41(2):53-55. 被引量:81
  • 10饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. 被引量:137

共引文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部