期刊文献+

基于Snort的入侵检测系统在校园网非法代理检测中的应用

Application of IDS Based on Snort in Detection of Unauthorized Proxy in Campus Network Environment
在线阅读 下载PDF
导出
摘要 随着互联网的高速发展,作为学校重要基础设施的校园网承担着越来越重的任务,其安全问题也愈加突出,其中,内网用户私自架设代理服务器,恶意占用校园网资源,逃避网络管理成为了一个突出的问题。讨论了目前校园网中常见的代理技术以及目前使用较多的检测手段,并对其优缺点进行了分析,提出了使用入侵检测技术对校园网中非法代理进行检测,并通过具有代表性的Snort系统进行了检测方法分析,并通过实验进行了验证。 With the development of Internet, the campus network takes more and more important tasks, and the security issue became a remarkable task. The users evade management and steal resources of campus network by taking proxy server privately became a remarkable problem. The proxy techniques usually used in campus networks and the detect instruments in common use are discussed, and analysed the excellence and disadvantage. A view of detecting the unauthorized proxy server in campus networks by intrusion detection system is Presented. The detect technique with the representational IDS snort is analysed, and took the test to validate it.
作者 马骏 黄超亮
出处 《科学技术与工程》 2009年第11期3120-3123,3130,共5页 Science Technology and Engineering
关键词 校园网 代理主机(proxy) 入侵检测系统 SNORT campus network proxy intrusion detection system snort
  • 相关文献

参考文献7

二级参考文献47

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献241

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部