期刊文献+

入侵检测系统(IDS)剖析 被引量:2

The Architecture of Intrusion Detection System
下载PDF
导出
摘要 入侵检测系统(IntrusionDetectionSystemIDS)是现代网络安全的重要组成部分,通过监视特定的计算机或网络,检测可能的攻击并做出反应,保护系统及信息的安全。IDS不仅帮助系统对付外来网络攻击,还可以查知内部合法用户的非法操作,扩展系统管理员的安全管理能力,是防火墙之后的第二道安全阀门。文章叙述了入侵检测技术的发展状况和关键技术,对现有系统进行了分类。 Intrusion detection technology is an active security technology.Intrusion detection system monitors the usage of protected systems,detects insecure states.It can not only help coping with external attacks but also detects the misuse of the legitimate users.IDS extends the securty administrator's ability and offers real-time protection to systems and is considered as the second line of defends behind firewall.In this paper we introduce the development and key technologies of IDS,give taxonomy of present systems.
出处 《计算机与数字工程》 2004年第5期105-107,85,共4页 Computer & Digital Engineering
关键词 网络安全 入侵检测 网络监控 network security,intrusion detection,network monitor
  • 相关文献

参考文献4

二级参考文献11

  • 1[1]Lampson B,Rivest R. Cryptography and Information Security Group Research Project: A Simple Distributed Security Infrastructure:[Technical Report]. MIT, 1997 被引量:1
  • 2[2]Blaze M,Feigenbaum J. The Role of Trust Management in Distributed Systems Security. AT&T Labs-Research,Distributed System Lab CIS Department, University of Pennsylvania, 2000 被引量:1
  • 3[3]Resnick P,Miller J. PICS:Internet Access Controls Without Censorship. Communications of the ACM,Oct. 1996 被引量:1
  • 4[4]Kumar K,Spafford E. A Pattern Matching Model for Misuse Intrusion Detection. In: Proc. of the 17th National Computer Security Conf. 1994. 11~12 被引量:1
  • 5[1]Debar H,Dacier M,Wespi A.Towards A Taxonomy of Intrusion-Detection Systems[J].Computer Networks.1999,31:805-822. 被引量:1
  • 6[2]Denning D E.An Intrusion Detection Model[J].IEEETransaction on Software Engineering.1987,13(2):222-232. 被引量:1
  • 7[3]Lunt T F.A Survey of Intrusion Detection Techniques[J].Computer&Security.1993,(12):405-418. 被引量:1
  • 8[4]Sommer P.Intrusion Detection System as Evidence[J].Computer Networks.1999,31:2477-2487. 被引量:1
  • 9[6]Zhang Cui,Levitt K,Heckman M.Intrusion Detection Inter-Component Adaptive[J].Computer Network.2000,(34):605-621. 被引量:1
  • 10Chen Yue,计算机科学,2001年 被引量:1

共引文献71

同被引文献7

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部