期刊文献+

基于网络入侵检测系统的改进BM模式匹配算法研究 被引量:6

ON IMPROVED BM PATTERN MATCHING ALGORITHM BASED ON NETWORK INTRUSION DETECTION SYSTEM
在线阅读 下载PDF
导出
摘要 对目前常见的网络入侵检测系统中模式匹配算法进行研究总结,针对著名的Snort中的模式匹配算法,进行了详细分析和对比。以求取优化检测效率、降低算法的时间和空间复杂度为目标,设计基于网络入侵检测系统的改进BM模式匹配算法。将该改进BM模式匹配算法应用到实际网络入侵检测过程中,针对处理结果进行科学评价。通过实例的应用,验证了提出算法的可行性和高效性。 In this article we study and summarise the existing common pattern matching algorithm of network intrusion detection system,and make detailed analysis and comparison on the pattern matching algorithm of famous Snort system.Pursuing the targets of optimising detection efficiency and reducing the time and space complexity of the algorithm,we design an improved BM pattern matching algorithm which is based on network intrusion detection system.We also apply the improved BM pattern matching algorithm to real network intrusion detection process,and scientifically evaluate its processing results.Through practical applied case,we have verified the feasibility and effectiveness of this improved algorithm.
作者 易著梁
出处 《计算机应用与软件》 CSCD 北大核心 2012年第11期193-195,207,共4页 Computer Applications and Software
基金 广西教育厅广西高等教育教学改革工程"十一五"第三批立项项目(2007-109-89)
关键词 网络入侵检测系统 模式匹配 复杂度 数学模型 优化策略 Network intrusion detection system Pattern matching Complexity Mathematical model Optimised strategy
作者简介 易著梁,副教授,主研领域:计算机教育,计算机应用,计算机网络,Linux技术。
  • 相关文献

参考文献5

  • 1Shiu Yin Yuen, Chi Kin Chow. A Genetic Algorithm That Adaptively Mutates and Never Revisits [ J ]. IEEE transactions on evolutionary computation ,2009,13 (2) :454.
  • 2Tseng L Y, Lin Y T. A hybrid genetic local search algorithm for the permutation flowshop scheduling problem[ J]. European Journal of Operational Research,2009,198( 1 ) :84 -92.
  • 3齐晖,曹旻,袁世忠.模式匹配算法性能对比试验结果在入侵检测系统中的应用[J].河南科学,2009,27(7):835-838. 被引量:3
  • 4唐勇,卢锡城,王勇军.攻击特征自动提取技术综述[J].通信学报,2009,30(2):96-105. 被引量:19
  • 5Karen Scarfone, Peter Mell. Intrusion Detection and Prevention Systems [ M ]. Handbook of Information and Communication Security, 2010, B : 177 - 192.

二级参考文献44

  • 1唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 2KABIRI P, GHORBANI A A. Research on intrusion detection and response: a survey[J]. International Journal of Network Security. 2005, 1(2): 84-102.
  • 3KREIBICH C, CROWCROFT J. Honeycomb-creating intrusion detection signatures using honeypots[A]. Proceedings of the Second Workshop on Hot Topics in Networks (Hotnets Ⅱ)[C]. Boston: 2003. 51-56.
  • 4YEGNESWARAN V, GIFFIN J T, BARFORD P, et al. An architecture for generating semantics-aware signatures[A]. Proceedings of the 14th USENIX Security Symposium[C]. Baltimore, MD, USA, 2005. 97-112.
  • 5NEWSOME J, KARP B, SONG D. Polygraph: automatically generating signatures for polymorphic worms[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Washington, DC, USA, IEEE Computer Society, 2005.226-241.
  • 6KIM H A, KARP B. Autograph: toward automated, distributed worm signature detection[A]. Proceedings of USENIX Security Symposium[C]. 2004.271-286.
  • 7CRANDALL J R, WU S F, CHONG F T. Experiences using minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities[A]. Proceedings of GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)[C]. 2005.359-389.
  • 8CRANDALL J R, SU Z, WU S F, et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits[A]. Proceedings of the 12th ACM Conference on Computer and Communications Security[C]. New York, NY, USA, ACM Press,2005.235-248.
  • 9VARGIYA R, CHAN P. Boundary detection in tokenizing network application payload for anomaly detection[A]. Proceedings of ICDM Workshop on Data Mining for Computer Security(DMSEC)[C]. 2003.
  • 10WANG K, CRETU G, STOLFO S J. Anomalous payload-based worm detection and signature generation[A]. Proceedings of Recent Advances in Intrusion Detection (RAID)[C]. 2003.227-246.

共引文献20

同被引文献43

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部