期刊文献+

Windows平台下Snort系统的架构与实现 被引量:1

Architecture and Implementation of Snort System under Windows Platform
在线阅读 下载PDF
导出
摘要 通过对入侵检测系统的深入研究,在此基础上,架构了一个在Windows平台下的基于Snort的分布式网络入侵检测系统。该系统模型融合了层次模型和分布式协作模型的优点,采用三级分层体系结构,并融合了改进的BM模式匹配算法(IBM算法)。实验结果表明,该系统能够对缓冲区溢出、端口扫描等攻击进行很好地探测,相比传统的Snort系统,在检测效率和性能上均有大幅度提高。同时该系统还提供了更加人性化的操作界面,方便了用户的操作和使用。 Through studying and analyzing the current intrusion detection system ( IDS), a novel and visual distributed intrusion detection system (DIDS) based on the Snort under the Windows platform is proposed. The system model combines the advantages of the hierarchi- cal model and the distributed collaboration model,using three-layer architecture, and integrated into the improved BM pattern matching algorithm (IBM algorithm). The experimental results show that the Snort system is able to detect buffer overflows ,port scans and other attacks. Compared with the traditional Snort system, the system can improve greatly the detection efficiency and performance, and posses- ses better universalness and expansibility. The system also provides a more humane operation interface, and be convenient for the user's operation and use.
出处 《计算机技术与发展》 2013年第1期154-156,176,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(61163025) 内蒙古自治区自然科学基金项目(2010BS0904) 内蒙古自治区高等学校科学研究基金项目(重点项目)(NJ10162) 内蒙古自治区高等学校科学研究项目基金项目(NJZY07116)
关键词 网络安全 入侵检测系统 SNORT BM算法 ACID network security intrusion detection system Snort BM algorithm ACID
  • 相关文献

参考文献15

  • 1Aguirre I, Alonso S. Improving the automation of security information management : a collaborative approach [ J ]. Security & Privacy,2012,10( 1 ) :55-59.
  • 2Shiravi A, Shiravi H, Tavallaee M, et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection[J]. Computers and Security,2012,31 ( 3 ) :357 -374.
  • 3Hulitt E,Vaughn R B. Information system security compliance to FISMA standard : a quantitative measure [ J ]. Telecommunication Systems, 2010,45 ( 2- 3 ) : 139-152.
  • 4Werlinger R,Muldner K, Hawkey K, et al. Preparation, detection and analysis:the diagnostic work of IT security incident response [ J ]. Information Management & Computer Security, 2010,18( 1 ) :26-42.
  • 5Yoon M,Chen Shigang,Zhang Zhan. Minimizing the maximum firewall rule set in a network with multiple firewalls[ J]. IEEE Transactions on Computers ,2010,59 ( 2 ) :218-230.
  • 6Chao C S,Yang S J H. A novel three-tiered visualization approach for firewall rule validation [ J ]. Journal of Visual Languages & Computing ,2011,22 ( 6 ) :401-414.
  • 7Rovniagin D, Wool A. The geometric efficient matching algorithm for firewalls [ J ]. IEEE Transactions on Dependable and Secure Computing ,2011,8 ( 1 ) : 147-159.
  • 8Shahrestani S A. Employing artificial immunology and approxialate reasoning models for enhanced network intrusion detection [ J ]. WSEAS Transactions on Information Science and Applieations,2009,6 ( 2 ) : 190-200.
  • 9Aydin M A,Zaim A H,Ceylan K G A. Hybrid intrusion detection system design for computer network security[J]. Computers and Electrical Engineering,2009,35 ( 3 ) 517-526.
  • 10Papadogiannakis A, Vasiliadis G, Antoniades D,et al. hnproving the performance of passive network monitoring applications with memory locality enhancements[ J ]. Computer Communications ,2012,35 (1): 129-140.

二级参考文献4

  • 1Denning D.An intrusion-detection model[A].In IEEE Symposium on Security and Privacy[C].Oakland,USA:IEEE,1986.118-131
  • 2Wang Ke,Stolfo S J.Anomalous Payload-based Network Intrusion Detection[Z].RAID,SpringerLink,2004.
  • 3Kruegel C,Toth T,Kirda E.Service Specific Anomaly Detection for Network Intrusion Detection[A].In Symposium on Applied Computing(SAC)[C].Spain:ACM,2002.
  • 4张翔,张吉才,王韬,米东.开放源代码入侵检测系统——Snort的研究[J].计算机应用,2002,22(11):96-97. 被引量:13

共引文献3

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部