期刊文献+

一种基于云计算的入侵检测系统模型 被引量:4

A Model of Intrusion Detection System Based on the Cloud Computing
在线阅读 下载PDF
导出
摘要 文章首先对传统的防火墙技术及其局限性做了简要分析,其次设计了基于云计算的入侵检测系统模型,并对其技术实现进行了探讨。该系统可以迅速判断并阻止已知和未知的安全问题,使之在发生之前加以拦截,展示了基于云计算架构的Web内容防护解决方案。本模型可用于进一步阻止目前快速增长且极具动态性的网络威胁,提高了网络整体的安全性能。 Firstly, this article gives a brief analysis of traditional firewall and its limitations, and then designs the model of intrusion detection system based on the cloud computing and discusses the technology realization of the model. The system can detect and block known and unknown security problem rapidly, intercept before it happens, and display the solution to the Web content protection based on the cloud computing. This model can further be used to prevent the rapid growth and highly dynamic network threats, and so improve the overall security performance of the network.
作者 张辉
出处 《信息网络安全》 2011年第12期69-71,共3页 Netinfo Security
基金 山西省高校科技开发项目[20111134]
关键词 云计算 入侵检测 网络入侵 cloud computing intrusion detection network intrusion
  • 相关文献

参考文献5

二级参考文献21

  • 1Rose M T.The Blocks Extensible Exchange Protocol Core[S].RFC3080,2001
  • 2Rose M T.BEEP:The Definitive Guide[M].O'Reilly Press,2002
  • 3Dierks T.The TLS protocol version 1.0[S].RFC2246,1999
  • 4Myers J.Simple Authentication and Security Layer (SASL)[S].RFC2222,1997
  • 5Curry D.Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language Document Type Definition[EB/OL].http://www.ietf.org/proceedings/03nov/I-D/draft-ietf-idwg-idmef-xml-10.txt,2003
  • 6Menga J.CCSA NG:Check Point Certified Security Administrator Study Guide[M].Sybex Press,2003
  • 7Neil Desail.Increasing Performance in High Speed NIDS[EB/OL].http://www.linuxsecurity.com/resource.files/instrusion-detecttion/increasing-performance-in-high-speed-NIDS.pdf,2003-01.
  • 8Boyer RS,Moore JS.A Fast String Searching Algorithm[J].Communications of the ACM,1977,20:762-772.
  • 9Aho AV,Corasick MJ.Efficient String Matching:An Aid to Bibliographic Search[J].Communications of the ACM,1975,18:333-340.
  • 10Commentz-Walter B.A String Matching Algorithm Fast on the Ave-rage[C].Proc.of the 6th International Colloquium on Automata Languages,and Programming,1979.118-132.

共引文献24

同被引文献21

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 3朱烨行,戴冠中,慕德俊,李艳玲.基于内容审查过滤的网络安全研究[J].计算机应用研究,2006,23(10):130-132. 被引量:6
  • 4Wu Yang, Wei Wan, Lin Guo, Le-Jun Zhang. An Efficient Intrusion Detection Model Based on Fast Inductive Leaming[J].Machine Learning and Cybernetics, 2007 International Conference, 2007, (06):1 9-22.
  • 5Young U.1Lyu, Hyeun-Suk Rhee. Evaluation of intrusion detection systems under a resourrce constraint[J]. ACM Transactions on Information and SystemSecurity, 2008, 11(04): 3-22.
  • 6冯登国.国内外信息安全技术研究现状及发展趋势[A].中国计算机科学技术发展报告[C].北京:清华大学出版社,2006.236-256.
  • 7Young U Ryu,Hyeun-Suk Rhee. Evaluation of intrusion de-tection systems under a resourrce constraint[J].ACM Trans-actions on Information and SystemSecurity,2008,(04):3-22.
  • 8Wu Yang,Wei Wan,Lin Guo. An Efficient Intrusion Detection Model Based on Fast Inductive Learning[J].Ma-chine Learning and Cybernetics,2007,(06):19-22.
  • 9余生晨,王树,高晓燕,黄江兰.网络入侵检测系统中的最佳特征组合选择方法[J].计算机工程,2008,34(1):150-152. 被引量:19
  • 10于咏霞,杨阳,余生晨.基于免疫算法和支持向量机的入侵检测研究[J].华北科技学院学报,2009,6(1):78-79. 被引量:1

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部