期刊文献+

Snort数据包分析研究及软件开发

在线阅读 下载PDF
导出
摘要 针对Snort日志文件数据,给出其以太帧、IP数据报、TCP数据报和应用层数据进行协议分析的原理和方法,弥补了Snort在应用层数据分析上的不足.
作者 尤良芳 董忠
出处 《天水师范学院学报》 2010年第5期126-128,共3页 Journal of Tianshui Normal University
作者简介 尤良芳(1966-),女,四川成都人,天水师范学院物理与信息科学学院副教授,硕士.
  • 相关文献

参考文献4

二级参考文献18

  • 1陈莉军.“nux操作系统内核分析[M].北京:人民邮电出版社,2000..
  • 2Jamal Hadi Salim and Rovert Olsson,Beyond Sofinet,the Proceedings of the 5th Annual Linux Showcase&Conference.2001.
  • 3J.Mogul and K.K.Ramakrishnan,Eliminating reive livelock in all interrupt driven kernel,Winter USENIX Conference,Jan.1996.
  • 4Alessandro Rubini&Jonathan Corbet,Linux Device Drivers,http://www.oreilly.com/catalog/linuxdrive2/chapter/bookindexpdf.html.2001.
  • 5Yu-Sung Wu,Bingrui Foo,Yongguo Mei et al.Collaborative Intrusion Detection System(CIDS):A Framework for Accurate and Efficient IDS[C].In:Proceedings of the 19th Annual Computer Security Applications Conference(ACSAC 2003),2003.
  • 6Tao Zou,Hongwei Sun,Xinguang Tian et al.Modeling A Self-learing Detection Engine Automatically for IDS[C].In:Proceedings of the 2003IEEE International Conference on Robotics,Intelligent System and Signal Processing,Changsha,China,2003.
  • 7Ning P,Cui Y,Reeves D S.Constructing attack scenarios through correlation of intrusion alerts[C].In:Proceedings of the 9th ACM Conference on Computer & Communications Security,Washington,USA:ACM Press,2002:245~254.
  • 8Valdes A,Sknner K.Probabilistic alert correlation[C].In:Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection,Springer-Verlag,2001:54~68.
  • 9Lee W,Stolfo S,Mok K.A data mining framework for adaptive intrusion detection.http://www.cs.columbia.edu/~sal/hpapers/framework.ps.gz.
  • 10Lee W,Stolfo S J,Mok K.Algorithms for mining system audit data.http://citeseer.ist.psu.edu/lee99algorithms.html,1999.

共引文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部