期刊文献+

基于协议分析的网络入侵检测技术 被引量:17

Network Intrusion Detection Techniques Based on Protocol Analysis
在线阅读 下载PDF
导出
摘要 网络协议分析是网络入侵检测中的一种关键技术,当前主要方法是对网络层和传输层协议进行分析。文章基于状态转换进行协议分析和检测,以充分利用协议的状态信息检测入侵,有效地完成包括应用层协议在内的网络各层协议的分析,更加精确地定位了检测域,提高了检测的全面性、准确性和检测效率;这种方法综合了异常检测和误用检测技术,可以更有效地检测协议执行时的异常和针对协议的攻击,并且可检测变体攻击、拒绝服务攻击等较难检测的攻击。 The network protocol analysis is an essential technique in network intrusion detection.The existing techniques mainly analyze network layer protocols and transport layer protocols.On the basis of existing techniques of protocol anal-ysis,by using a protocol analysis technique based on state transition,it proposes an intrusion detection technique that takes full advantage of the protocol state information for detecting intrusion.It can effectively analyze protocols at various layers of network including application layer protocols and can accurately locate the field of detection,which enhances the completeness,accuracy and efficiency of detection.It combines anomaly detection and misuse detection together and can effectively detect exceptional executions of protocols and protocol attacks.Some attacks which are difficult to be de-tected,such as polymorphic attacks and Denial of Service(DoS)attacks,can be detected by using this method.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第36期128-133,共6页 Computer Engineering and Applications
基金 国家863高技术研究发展计划基金资助(编号:2001AA144150)
关键词 防火墙 网络安全 网络协议 入侵检测技术 网络层 传输层协议 计算机网络 Intrusion detection,Network-based intrusion detection system,Protocol analysis,State transition
  • 相关文献

参考文献13

  • 1[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000
  • 2[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998
  • 3[3]Brian Caswell.snort.http:∥www.snort.org/
  • 4[4]ISS Company. RealSecure Network Protection.http:∥www.iss.net/products_services/enterprise_protection/rsnetwork/index.php
  • 5[5]Ilgun K,Kemmerer R A,Porras P A.State transition a.nalysis:A rulebased intrusion detection approach[J].Software Engineering,IEEE Transactions on, 1995; 21 (3): 181 ~ 199
  • 6[6]Vigna G,Kemmerer R A.NetSTAT:A Network-based Intrusion Detection Approach[C].In:Proceedings of the 14th Annual Computer Security Applications Conference(ACSAC), 1998
  • 7[7]Alec Yasinsac. An Environment for Security Protocol Intrusion Detection[J].Journal of Computer Security,2002; (10): 177~188
  • 8[8]Shan Zheng,Chen Peng,Xu Ying et al.A network state based intrusion detection model. Computer Networks and Mobile[C].In:Computing,2001.Proceedings.2001 International Conference on,2001:481~486
  • 9[9]Karen Kent Frederick. Network Intrusion Detection Signatures,Part 5.http:∥online.securityfocus.com/infocus/1569,2002
  • 10[10]Stevens W R.TCP/IP Illustrated,Volume 1 :The Protocols[M].Addison Wesley, 1994

同被引文献155

引证文献17

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部