期刊文献+

基于应用的高速网络入侵检测系统研究 被引量:29

Research on application-based network
在线阅读 下载PDF
导出
摘要 传统的网络入侵检测方法基于传输层以下的数据包特性来检测入侵,因此存在一些难以克服的缺点,如易受欺骗(evasion)、误报警(false positive)多、检测效率低等,难以适应高速的网络环境。为了解决这些问题,本文提出将应用协议分析方法应用到网络入侵检测中,实现基于应用的检测,并提出了一个改进的多模式匹配算法,进一步提高检测的效率;同时针对高速网络环境,利用基于数据过滤的压缩技术与负载均衡技术提出了一个新的网络入侵检测系统结构模型,给出了系统的设计与实现方法。实验测试表明系统能够对吉比特以太网进行有效的实时检测。 The traditional network intrusion detection system only detect intrusions according to thepacket features below the transport layer, hard problems exist such as easy to be evaded, high false positive and low efficiency. In order to solve these problems, a detecting method based on application protocol analysis is used and an efficient multiple-pattern searching algorithm is presented in order to improve the efficiency of the NIDS. A new architecture and model of NIDS based on data filtering and load balance is described, the design and implementation is also discussed. Lab tests reveals that the system is good at detecting the high-speed network such as gigabit Ethernet.
出处 《通信学报》 EI CSCD 北大核心 2002年第9期1-7,共7页 Journal on Communications
基金 国家863高技术计划资助项目(863-317-01-03-99)
关键词 网络入侵检测 协议分析 模式匹配 负载均衡 数据过滤 代理 network intrusion detection protocol analysis pattern searching load balance data filtering agent
  • 相关文献

参考文献9

  • 1SANDHU R S. Authentication, access control and intrusion detection[J]. IEEE Communications Magazine, 1994, 32(9): 40-48.
  • 2BASS T. Intrusion detection systems and multi-sensor data fusion[J]. Communications of the ACM, 2000, 43(4): 99-105.
  • 3KUMAR DAS. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks, 2000, 34(4): 579-595.
  • 4蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:376
  • 5COIT C J, STANIFORD S, MCALERNEY J. Towards faster string matching for intrusion detection[EB/OL]. http://www. silicondefense.com/software/acbm, 2001-06-21.
  • 6HANDLEY M, PAXSON V. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics[EB/OL]. http://www.cs.washington.edu/homes/ratul/nl/norm.ps, 2001-8-15.
  • 7ALMGREN M, LINDQVIST U. Application-integrated data collection for security monitoring [A]. RAID 2001[C]. 2001. 22-36.
  • 8刘大有,杨鲲,陈建中.Agent研究现状与发展趋势[J].软件学报,2000,11(3):315-321. 被引量:312
  • 9马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122

二级参考文献18

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8Yang Kun,计算机科学,1999年,26卷,9期,30页
  • 9Rao A S,Proceedings of the 1st International Conference on Multi-Agent Systems (ICMAS-9,1995年,312页
  • 10Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页

共引文献791

同被引文献179

引证文献29

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部