期刊文献+

基于智能化自学习方式的入侵检测防护系统设计与实现 被引量:6

Design and Implementation of Intrusion Detection Protection System based on Intelligent Self-learning Method
在线阅读 下载PDF
导出
摘要 随着网络结构日益复杂,网络攻击手段多样化,传统的防火墙已无法阻止多种类型的网络攻击。基于智能化自学习方式的入侵检测防护系统将防火墙与入侵检测系统集成为一体,符合NDIS接口规范。系统采用智能化自学习的方式来维护"黑名单"特征库,使防火墙具有自适应的特点,能够阻断未知入侵行为。系统具有快速稳定的防护效果,能够实时响应入侵行为,并提供危机预警的反馈机制。 With the growth of network structure complexity and the diversity of network attack methods, traditional ifrewalls have been unable to prevent many types of network attack. According to NDIS interface standard, intrusion detection protection system based on intelligent self learning method(IDPS-ISM) is developed, which has the advantages of ifrewall and intrusion detection system(IDS) combined. In order to realize a self-adaptive ifrewall to block unpredictable attack behaviors, method of intelligent self learning is used to maintain the"blacklist"of IDPS-ISM. The actual facts show that IDPS-ISM is fast and stable, and promises great real-time response. Besides, the system also has warning mechanism to against crisis.
出处 《信息网络安全》 2014年第2期20-26,共7页 Netinfo Security
基金 河南省科技厅科技攻关项目[122102210060]
关键词 智能化自学习 防火墙 入侵检测 自适应 intelligent self-learning ifrewall IDS self-adaptive
  • 相关文献

参考文献29

二级参考文献252

共引文献345

同被引文献119

  • 1康治平,向宏,傅鹂.基于API HOOK技术的特洛伊木马攻防研究[J].信息安全与通信保密,2007,29(2):145-148. 被引量:4
  • 2MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 3ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 4KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 5PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 6NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.
  • 7XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between vip OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556.
  • 8WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312.
  • 9Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258.
  • 10TomlinsonA. Introduction to the TPM [M]//Smart Cards, Tokens,Security and Applications. New York: Spring US,2008:155-172.

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部