期刊文献+

网络入侵检测中高效散列模式树算法的研究 被引量:2

Research of an Efficient Hash Pattern Tree Algorithm in Network Intrusion Detection
在线阅读 下载PDF
导出
摘要 本文在对一个具有代表性的基于特征的入侵检测系统的算法进行瓶颈分析的基础上 ,提出了一种并行的散列模式树算法 ,在目前入侵特征数量较大的情况下 ,该算法可以有效地解决现有算法的缺陷与不足。 After analyzing the bottleneck of a typical signature based NIDS algorithm, a parallel hash pattern tree algorithm is presented in this paper. When the amount of intrusion signatures is big, this new parallel algorithm can efficiently solve the limitation of the old algorithms.
出处 《计算机工程与科学》 CSCD 2002年第5期34-38,共5页 Computer Engineering & Science
基金 国家 8 63计划"十五"信息安全项目资助 (2 0 0 1AA14 2 0 3 0 )
关键词 网络 入侵检测 树算法 入侵特征 多模式匹配 模式树 散列 network intrusion detection system intrusion signature multi pattern match pattern tree hash
  • 相关文献

参考文献12

  • 1胡华平,陈海涛,黄辰林,唐勇.入侵检测系统研究现状及发展趋势[J].计算机工程与科学,2001,23(2):20-25. 被引量:53
  • 2Ulf Lindqvist.On the Fundamentals of Analysis and Detection of Computer Misuse:[Ph D Thesis] [D]. Department of Computer Engineering,Chalmers University of Technology, 1999.
  • 3Sandeep Kumer.Classification and Detection of Computer Intrusions:[Ph D Thesis][D]. Purdue University, 1995.
  • 4Jean-Philippe Pouzol ,Mireille Ducasse.Handling Generic Intrusion Signatures Is Not Trival[A].Raid 2000[C].2000.
  • 5Mukherjee B,Heberlein T L,Levitt K N. Network Intrusion Detection[J]. IEEE Network, 1994,8(3):26-41.
  • 6Thomas H Ptacek,Timothy N Newsham.Insertion,Evasion,and Denial of Service:Eluding Network Intrusion Detection[M]. Secure Networks Inc,1998.
  • 7Hyper Ion.Watcher[J]. Phrack Magazine, 1998,8(53).
  • 8Martin Roesch. Snort Docment and Sourcecode[EB/OL]. http://www.snort.org,2001-05-12.
  • 9陈海涛.CLIPS正向推理机的设计与实现:[学士学位论文][D].长沙:国防科技大学,1999.
  • 10胡华平,陈海涛,张怡,基于代理的网络入侵检测系统基本原型的详细设计[Z]. 863项目验收材料之二,2001.

二级参考文献6

共引文献57

同被引文献21

  • 1唐勇,胡华平,罗宇.高效报文捕获引擎FPC的研究与实现[J].计算机工程与科学,2006,28(5):27-29. 被引量:5
  • 2[1]K Keys,D Moore,R Koga,et al.The architecture of CoralReef:An Internet traffic monitoring software suite.PAM 2001 Workshop,Amsterdam,2001
  • 3[2]M Roesch.Snort-lightweight intrusion detection for networks.In:Proc of the 1999 LISA Conf.Berkeley,CA:USENIX Association,1999.229-238
  • 4[3]S McCanne,V Jacobson.The BSD packet filter:A new architecture for user-level packet capture.In:Proc of the Winter 1993 USENIX Conf.Berkeley,CA:USENIX Association,1993.259-270
  • 5[4]J C Moguland,K K Ramakrishnan.Eliminating receive livelock in an interrupt-driven kernel.ACM Trans on Computer Systems,1997,15(3):217-252
  • 6[6]K G Anagnostakis,S Ioannidis,S Miltchev,et al.Practical network applications on a lightweight active management environment.The 3rd IFIP Int'l Working Conf on Active Networks (IWAN),Philadelphia,2001
  • 7[7]D R Engler,M F Kaashoek.DPF:Fast,flexible message demultiplexing using dynamic code eneration.In:Proc of SIGCOMM.New York:ACM Press,1996.53-59
  • 8[8]K G Anagnostakis,M B Greenwald,S Ioannidis,et al.Open packet monitoring on FLAME:Safety,performance and applications.The 4th Int'l Working Conf on Active Networks (IWAN'02),Zurich,2002
  • 9[9]S Ioannidis,K G Anagnostakis,J Ioannidis,et al.xPF:Packet filtering for lowcost network monitoring.In:Proc of the IEEE Workshop on High-Performance Switching and Routing(HPSR).Piscataway,NJ:IEEE Press,2002.121-126
  • 10[10]Trung Nguyen,Willem de Bruijn,Mihai Cristea,et al.Scalable network monitors for high-speed links:A bottom-up approach.IPOM'04,Beijing,2004

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部