期刊文献+

入侵检测系统IDS的安全性研究 被引量:6

Research about Security of Intrusion Detection System
在线阅读 下载PDF
导出
摘要 通过对IDS系统的安全性和脆弱性的分析,提出了IDS系统安全度、入侵度以及脆弱度等安全评价指标,并在总结目前存在的攻击和躲避IDS系统的工具及技术的基础上,设计了一个新型的IDS安全体系结构实用配置模型。 In this paper,we discuss the security and vulnerability,and provide some newly concepts and evaluate indexes,such as security degree,intrusion degree and vulnerability degree,etc.Moreover,after analyzing and concluding the tools and techniques to attack or evade IDS detection,this paper presents a newstyle and utility security architecture model of IDS.
出处 《计算机应用研究》 CSCD 北大核心 2003年第11期69-72,共4页 Application Research of Computers
关键词 入侵检测系统 网络安全 安全度 脆弱性 Intrusion Detection System(IDS) Network Security Security Degree Vulnerability Analysis
  • 相关文献

参考文献12

  • 1戴云,范平志.入侵检测系统研究综述[J].计算机工程与应用,2002,38(4):17-19. 被引量:65
  • 2段海新,吴建平.一种分布式协同入侵检测系统的设计与实现[J].软件学报,2001,12(9):1375-1379. 被引量:21
  • 3T D Garvey, T F hint. Model Based Intrusion Detection [ C ].PMoceedings of the 14th National Computer Security Conference,1991.372-385.
  • 4Simon Edwards. Vulnerabilities of Network Intrusion Detection Systems: Realizing and Overcoming the Risk [ EB/OL ]. http://www. toplayer. com/WhitePapers/, 2001-04-22.
  • 5T H Ptacek T N Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection [ EB/OL]. Secure Networks, Inc, Jan. 1998. http://www, aciri. org/vem/PtackeNewsham-Evasion-98. ps, 2001-07-28.
  • 6P Andeson. Computer Security rllareat Monitor and Surveillance[ R ]. Technical Report, P Anderson Co, Fort Washington,Pennsylvania, 1980.45-47.
  • 7D E Denning. An Intrusion Detection Mode [ J ]. IEEE Transaction on Software Engineering, 1987, SE13(2) :222-232.
  • 8A Ataniford Chen. Common Intrusion Detection Framework[ EB/OL]. http://seclab. cs. ucdavis. edu/cidf/, 2002-01-17.
  • 9A Atanfford Hen. Common Intrusion Detection Framework[ EB/OL]. http://seclab. cs. ucdavis. edu/cidf/, 2001-12-05.
  • 10R Heady, G Luger, A Maccabe, et al. The Architecture of a Network Level Intrusion Detection System [ M ]. Technical University of New Mexico, 1990.89-90.

二级参考文献9

  • 1[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980.
  • 2[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232.
  • 3[3]Biswanath, Mukherjee, Heberlein, L.Todd. Network intrusion detection. IEEE Network, 1994,8(3):26~41.
  • 4[4]Javitz, H.S., Valdez, A. The SRI IDES statistical anomaly detector. In: Teresa, F.L., ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1991.
  • 5[5]Sobirey, M. Adaptive intrusion detection system (AID). 1998. http://www-rnks. informatik.tu-cottbus.de/~sobirey/aid.e.html.
  • 6[6]Heberlein, L.T., Dias, G.V., Levitt, K.N., et al. A network security monitor. In: IEEE ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1990. 296~304.
  • 7[7]Snapp, S.R., Brentano, J., Dias, G.V., et al. A system for distributed intrusion detection. In: Teresa, F.L., ed. Proceedings of the Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1991.
  • 8[8]Clifford, K., Porras, P.A. A common intrusion detecction framework. 1997. http://seclab.cs.ucdavis.edu/cidf.
  • 9李之棠,杨红云.模糊入侵检测模型[J].计算机工程与科学,2000,22(2):49-53. 被引量:50

共引文献84

同被引文献16

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部