期刊文献+

一种基于嫌疑事件链的变种入侵检测技术

A Variant Intrusion Detection Technique Based on Suspicious Event List
在线阅读 下载PDF
导出
摘要 滥用检测(misusedetection)是两大主要的入侵检测方法之一,它虽然对已知入侵的检测成效显著,但对其变种攻击,就无能为力。鉴于此,该论文提出了一个新的滥用检测方案,它不但能对已知入侵本身准确识别,而且对其变种,也能尽可能地予以识别,并确认出变种与原种入侵之间的差异。 Misuse detection is one of both intrusion detection methods.Despite of excellent effect on known intrusions,it holds futile on their variations.Therefore,this paper provides a new scheme for misuse detection,which not only can recognize known intrusions accurately,but also can recognize their variations as far as possible and confirm discrepancy between original intrusions and their variations.
机构地区 西南石油学院
出处 《计算机工程与应用》 CSCD 北大核心 2003年第36期163-165,共3页 Computer Engineering and Applications
关键词 防火墙 入侵检测系统 网络安全 事件链 计算机网络 Intrusion detection,Misuse detection,Networks security,Suspicious event
  • 相关文献

参考文献1

二级参考文献5

  • 1[1]Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks[M].By the consultants of the Network Security Solutions Ltd. Front-line Information Security Team(FIST), 1998.12
  • 2[2]Abdelaziz Mounji.Languages and Tools for Rule-Based Ditributed Intrusion Detection.The degree of Doctor of Computer Science Department of Facultes University,Belgioum,1997.9
  • 3[3]Request For Comments 791,792,793
  • 4[4]Calvin Ko,George Fink,Karl Levitt. Automated Detection of vunerabilities in Privileged Programs by Execution Monitoring[M].Depet.of Computer Seience,Davice,University of California
  • 5[5]Karyn Piehnarczyk,Steve Weeber,Riehard Feingold. Unix Incident Guide:How to Detect an Intrusion[S].CIAC-2305 R.1

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部