期刊文献+

一种分布式网络入侵防御系统 被引量:2

A Distributed Network Intrusion Prevention System
在线阅读 下载PDF
导出
摘要 为了改进当前IPS面临性能瓶颈、误报、漏报和攻击速度等问题,提出了一种分布式"分析与检测+集中控制+升级服务"架构的网络入侵防御系统。分析与检测主要采用协议识别和分析、协议异常检测、流量异常检测及响应方式等,集中控制主要用于监测控制入侵检测与防御系统的运行及其系统配置,升级服务负责定期提供攻击特征库的升级更新,使系统提供最前沿的安全保障。同时兼容其他安全产品,形成深度防御体系,最大限度地保护企业和组织的网络安全。 In order to improve the current performance bottlenecks facing IPS,false positive,false negative and attack speed issue etc,this paper presents a distributed "analysis and testing+centralized control+upgrade services" Architecture for Network Intrusion Detection and Prevention System.Analysis and testing can be achieved mainly through protocol identification and analysis,protocol anomaly detection,traffic anomaly detection and response methods.Centralized control is primarily used for intrusion detection and prevention monitoring and control system operation and system configuration.Upgrade Service is responsible for regular upgrades attack signature updates to make sure that the system provides the most cutting-edge security.Compatible with other security products,this system forms the depth of defense,to protect businesses and organizations to maximize network security.
出处 《计算机系统应用》 2011年第7期22-25,共4页 Computer Systems & Applications
基金 国家改委信息安全产品专项基金(发改办高技[20091886号])
关键词 入侵检测与防御 协议识别 异常检测 流量监测 网络攻击 intrusion detection and prevention protocol identification anomaly detection flow monitoring network attacks
  • 相关文献

参考文献7

二级参考文献38

  • 1李娜,秦拯,张大方,陈蜀宇.基于Markov Chain的协议异常检测模型[J].计算机科学,2004,31(10):66-68. 被引量:6
  • 2唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 3罗鹏飞 张文明 等.随机信号分析[M].国防科技大学出版社,2000..
  • 4KARL LEVITT. Intrusion Detection: Current Capabilities and Future Directions [A]. Proceedings of 18th Annual Computer Security Applications Conference [C]. 2002. 365 - 370.
  • 5KUMAR DAS. Protocol Anomaly Detection for Network - based Intrusion Detection [ EB/OL ]. http://www. sans. org/rr/whitepapers/detection/349. php, 2001 - 05 - 23.
  • 6SACHI P Joglekar, Stephen R Tate. ProtoMon: Embedded Monitors for Crytographic Protocol Intrusion Detection and Prevention [A]. Proceedings of the International Conference on Information Technology: Coding and Computing ( ITCC' 04 ) [ C ].2004.81 - 86.
  • 7JUAN M Estevez-Tapiador, Pedro Garcia- Teodoro, Jesus E Diaz-Verdejo. Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection [ A]. Proceedings of the First IEEE International Workshop on Information Assurance (IWIA' 2003 )[C]. Washington DC, USA: IEEE Computer Society Press,2003.3 - 12.
  • 8GAO Bo, MA Hui-Ye, YANG Yu-Hang. HMMS ( Hidden Markov Chain Models) Based on Anomaly Intrusion Detection Methd[A]. Proceedings of the First Conference on Machine Learning and Cyberneties [ C]. Beijing, 2002. 381- 385.
  • 9MCHUNG J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory [ J ]. ACM Transactions on Information and System Security, 2001, 3(4): 262-294.
  • 10YE Nong, CHEN Qiang, Connie M Borror. EWMA Forecast of Normal System Activity for Computer Intrusion Detection [ J ].IEEE Transactions on Reliability, 2004, 53(4): 557 - 566.

共引文献13

同被引文献21

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部