期刊文献+

大规模互联网络的入侵检测 被引量:11

Intrusion detection in large-scale network
在线阅读 下载PDF
导出
摘要 介绍了大规模互联网络入侵检测技术的发展现状 ,对网络入侵检测的体系结构 ,异常检测技术 ,响应技术 ,入侵检测的协同技术 ,网络基础设施的保护技术等热点问题进行了讨论 。 The state-of-art of intrusion detection technology in a large-scale network is introduced since the security is getting more dependent among inter-connected networks. Some hot topics, such as the architecture of IDS(intrusion detection system), abnormal detection, response technology, coordinated detection, and the technologies used to protect network infrastructure, are discussed in detail. Some trends of development are mentioned as well.
作者 龚俭 陆晟
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2002年第3期325-330,共6页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金重点项目资助 ( 90 10 40 31)
关键词 大规模互联网络 入侵检测系统 异常检测 入侵响应 协同检测 入侵追踪 网络安全 体系结构 intrusion detection system abnormal detection response to intrusion coordinated detection intrusion trace-back network security
  • 相关文献

参考文献24

  • 1[1]Jai Balasubramaniyan, Garcia-Fernandez Jose Omar, Isacoff David, et al. An ar chitecture for intrusion detection using autonomous agents[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 9805, 1998.
  • 2[2]Staniford-Chen S, Cheung S, Crawford R, et al. GrIDS-a graph-b ased intrusion detection system for large networks[A]. In: The 19th National Information Systems Security Conference[C].1996.http://seclab.cs.ucdavis. edu/papers/nissc96.pdf.
  • 3[3]Tung Brian. Common intrusion detection framework (CIDF)[EB/OL] . http://www.isi.edu/~brian/cidf/1999-09-10/2001-05-07.
  • 4[4]Zamboni Diego, Spafford E H. A prototype for a distributed intrusio n detection system[D]. Department of Computer Sciences, Purdue University, West Lafayette, Indiana: Coast TR 98-06,1998.
  • 5[5]Vigna G, Kemmerer R A. NetSTAT: a network-based intrusion detection system [J]. Journal of Computer Security,1999,7(1).http://ww w.cs.ucsb.edu/~rsg/pub/1999-vigna-kemmerer-jcs99.ps.gz.
  • 6[6]Bishop Matt, Northcutt Stephen. Executive summary[EB/OL]. http ://seclab.cs .ucdavis.edu/projects/idrds/summary.html, 1998-08-04/2001-05-07.
  • 7[7]Erlinger Michael, Staniford-Chen Stuart. Intrusion detection exchang e format (idwg)[EB/OL]. http://www.ietf.org/html.charters/idwg-chart er.html, 2001-04-30/2001-05-07.
  • 8[8]Eckmann S T, Vigna G, Kemmerer R A. STATL: an attack language for sta te-based intrusion detection[A]. In: Proc of the ACM Workshop on Int rusion Detection[C]. Athens, Greece, 2000. http://www.cs.ucsb.edu/~rsg/ pub/2000-eckmann-vigna-kemmerer-wids00.ps.gz.
  • 9[9]Vigna G, Eckmann S T, Kemmerer R A. Attack languages[A]. In: Proc of the IEEE Information Survivability Workshop[C]. Boston, MA, 2000. http://www.cs.ucsb.edu/~rsg/pub/2000-vigna-eckmann-kemmerer-attac klanguages.ps.gz.
  • 10[10]Renesse Robbert van, Minsky Yaron, Hayden Mark. A gossip-base d failure detection service[A]. In: Proc of Middleware'98[C]. England,1 998. http://www.cs.cornell.edu/Info/Projects/Spinglass/public-pdfs/Goss ip%2520Style%2520Failure.pdf.

同被引文献95

引证文献11

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部