期刊文献+

基于时态知识模型的网络入侵检测方法研究 被引量:9

Study on Method of Network Intrusion Detection Based on Temporal Knowledge Model
在线阅读 下载PDF
导出
摘要 在分析国内外现有入侵检测技术和系统的基础上 ,提出了一种基于时态知识模型和可变滑动窗口的实时模式提取算法 ,并在此基础上 ,实现了基于规则的、层次化的智能入侵检测原型系统 (RIDES) .实验结果表明 :该系统不仅能快速检测网络入侵 ,而且具有一定的学习能力 ,能够适应不同的网络应用环境 . On the basis of analyzing of existing method and system, this paper presents a real time intrusion detection expert system (RIDES). A new layered structure which can easily deal with huge amount of data is applied to RIDES. In order to effectively detect intrusion in real time, a pattern extraction algorithm based on temporal knowledge model and varying glide time window is provided. The temporal knowledge model we suggested takes account into time factor, which is helpful for extracting temporal knowledge. To demonstrate the validity of the algorithm, RIDES is developed on Linux operating system, and tested in real network environment. The experimental results reveal that the system can detect and report variety of intrusions and the algorithm is viable. The system can be easily integrated into network security products.
出处 《计算机学报》 EI CSCD 北大核心 2003年第11期1591-1597,共7页 Chinese Journal of Computers
基金 国家自然科学基金 ( 60 13 2 0 3 0 69983 0 0 5 ) 国家教育部博士点基金(RFDP19990 4860 2 )资助
关键词 计算机网络 网络安全 信息安全 时态知识模型 网络入侵检测方法 intrusion detection temporal knowledge model varying glide window algorithm of pattern extraction
  • 相关文献

参考文献6

  • 1Cannady J, Harrell J. A Comparative analysis of current intrusion detection technologies. In: Proceedings of the 4th Technologies for Information Security Conference, Houston, 1996. 50~57
  • 2Anderson D, Frivold T, Valdes A. Next-generation intrusion detection expert system (NIDES): A summary. SRI International Technical Report SRI-CSL-95-07, 1995
  • 3Porras P A, Neumann P G. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 20th National Information Systems Security Conference, Maryland, 1997. 353~365
  • 4Sebring M, Shellhouse E, Hamma M E. Expert system in intrusion detection: A case study. In: Proceedings of the 11th National Computer Security Conference, Houston,1988. 74~81
  • 5Lindqvist U, Porras P A. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, 1999. 146~161
  • 6郭宏飞,周建常.实时数据及时态知识的表示[J].软件学报,1997,8(1):45-50. 被引量:5

共引文献4

同被引文献61

引证文献9

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部