期刊文献+

入侵检测研究综述 被引量:27

A Study Survery of Intrusion Detection
下载PDF
导出
摘要 论述和分析了入侵检测产生的原因、入侵检测的定义、当前的入侵检测技术及设计入侵检测系统时所要考虑的问题,指出了当前研究中存在的问题,同时给出了可能的解决途径。 This paper describes and analyses the cause of generation for intrution detecsion, the definition of intrusion detection, current technology of intrusion detection ,as well as what to be consider in the design of intrusion detection system. It also points the problems in current researches, and gives the possible solution.
出处 《计算机工程》 CAS CSCD 北大核心 2005年第3期4-6,56,共4页 Computer Engineering
基金 国家自然科学基金资助项目(602730075)
关键词 入侵检测技术 入侵检测系统 设计 问题 解决途径 研究综述 定义 产生 原因 Intrusion detection Network security Network flow Audit data
  • 相关文献

参考文献10

  • 1Anderson J P. Computer Security Threat Monitoring and Survillance.Tech. Rep., James P Anderson Co., Fort Washington, PA, 1980 被引量:1
  • 2Denning D E. An Intrusion Detection Model. IEEE Trans. Software Eng., 1987, SE-13(2): 222-232 被引量:1
  • 3Denning D E, Neumann P G. Requirements and Model for IDES-A Real-time Intrusion Detection Expert System. Technical Report.,Computer Science Laboratory, SRI Intrusional, Menlo Park, CA, 1985 被引量:1
  • 4Anderson D, Frivold T, Valdes A. Next-generation Intrusion Detection Expert System (NIDES): A Summary. SRI-CSL-95-07, SRI International, Menlo Park, CA, 1995-05 被引量:1
  • 5Sinclair C, Pierce L, Matzner S. An Application of Machine Learning to Network Intrusion Detection. Proceedings of 15th Annual Computer Security Applications Conference, ACSAC99, 1999:371-377 被引量:1
  • 6Lee W, Stolfo S J, MokK W. A Data Mining Framework for Building Intrusion Detection Models. Proceedings of the IEEE Symposium on Security and Privacy, 1999:120-132 被引量:1
  • 7Me L. Security Audit Trail Analysis Using Genetic Algorithms. Proceedings of the 12dh International Conference on Computer Safety,Reliability and Security, Poznan, Poland, 1993-10:329-340 被引量:1
  • 8Crosbie M, Price K. Intrusion Detection Pages. COAST Laboratory,Purdue University, http://www.cerias.purdue.edu/coast/intrusiondetection/, 2001-02-17 被引量:1
  • 9Ye N, Li X. A Scalable Clustering Tecnique for Intrusion Signature Recognition. IEEE Systems Man and Cybernetics Information Assurance and Security Workshop. West Point, New York, 2001-06 被引量:1
  • 10李庆华.基于入侵检测的并行数据挖掘研究.武汉:华中科技大学计算机学院,2003 被引量:1

同被引文献194

引证文献27

二级引证文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部