期刊文献+

入侵检测技术概述 被引量:22

A Survey of Intrusion Detection Techniques
在线阅读 下载PDF
导出
摘要 入侵检测是保护信息系统安全的重要途径,近年来成为安全领域的研究热点。论文介绍了入侵检测系统的发展历史及现状,阐述了入侵检测系统的分类和通用入侵检测框架,并详细讨论了各种入侵检测技术。在文章的最后,还讨论了该领域存在的问题及今后的研究方向。 Intrusion Detection plays an important role in protecting information system security and becomes a central issue of security research in recent years.This paper presents the history and current condition in the field of Intrusion Detection,and illustrates the classification of Intrusion Detection System and Common Intrusion Detection Framework.In addition,detection techniques are discussed here in detail,and simultaneously some extant problems and the future di-rection are also talked over at the end of the paper.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第2期133-136,225,共5页 Computer Engineering and Applications
基金 国家自然科学基金重点课题(编号:90104005 90204011) 教育部博士点基金(编号:20020486046) 湖北省自然科学基金(编号:2002AB0039)
关键词 入侵检测 网络安全 检测技术 Intrusion Detection,network security,detection technique
  • 相关文献

参考文献4

二级参考文献26

  • 1Debar, Hervé and Dacier et al. Towards a Taxonomy of Intrusion Detection Systems. Zurich, Switzerland, IBM Research, 1998(http: ∥www. zurich. ibm. com/).
  • 2T H Ptacek and T N Newsham. Insertion, evasion, and denial of service: Eluding Network Intrusion Detection.Technical report, Secure Networks Inc., January 1998.
  • 3http:∥www. phrack. org.
  • 4D Malkhi and M Reiter. Unreliable Intrusion Detection in Distributed Computations, Proc. of the 10th Computer Security Foundations Workshop, Rockport, MA, June 1997:116 ~ 124.
  • 5Paxson V . Bro: A System for Detecting Network Intruders in Real- Time. In Proc. of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
  • 6The LIDS Project. http: ∥www. lids. org.
  • 7Snapp S R, Brentano J, Dias G V, et al. DIDS - Motivation,Architecture and an Early Prototype, Proc. of the 14th National Computer Security Conference, Washington, D C.,Oct. 1991:167 ~ 176.
  • 8Eugene H Spafford and Diego Zamboni. Intrusion detection using autonomous agents. Computer Networks, October2000, 34(4): 547 ~ 570.
  • 9James P Anderson. Computer Security Threat Monitoring and Surveillance. Technical Report, James P Anderson Co.,Fort Washington, PA., 1980.
  • 10Dorothy Denning. An Intrusion Detection Model. IEEE Transactions on Software Engineering, 1987, 13 (2): 222 ~232.

共引文献423

同被引文献122

引证文献22

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部