期刊文献+

模式匹配和协议分析方法的比较 被引量:1

Comparison between protocol analysis and pattern matching algorithm
原文传递
导出
摘要 入侵检测系统分析数据的方法很多,早期应用比较广泛的是模式匹配方法,目前人们普遍提倡协议分析的方法。本文在研究和比较模式匹配和协议分析的逻辑结构、分析过程的基础上,从理论上证明了协议分析的决定性优势,并提出了这两种数据分析方法将来必定结合运用的发展趋势。 Protocol analysis and pattern matching algorithm are two methods in intrusion detection systems .The paper analysed and studied logic structure and analysis procedure of the two methods, argued that protocol analysis has notable superiority; subsequently the paper claimed that the combination of the two methods is inevitable tendency.
作者 朱海霞 刘廉
出处 《网络安全技术与应用》 2005年第7期54-55,36,共3页 Network Security Technology & Application
关键词 入侵检测系统 计算机网络 网络安全 防火墙 模式匹配 协议分析方法 网络协议 Intrusion Detection Pattern Matching Algorithm Protocol Analysis Snort
  • 相关文献

参考文献5

二级参考文献24

  • 1[1]Allen J et al.State of the Practice of Intrusion Detection Technologies[R].TECHNICAL REPORT,CMU/SEI-99-TR-028,Carnegie Mellon University, Software Engineering Institute, 2000 被引量:1
  • 2[2]Ptacek T H,Newsham T N.Insertion,Evasion,and Denial of Service:EludingNetwork Intrusion Detection.http:∥www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html , 1998 被引量:1
  • 3[3]Brian Caswell.snort.http:∥www.snort.org/ 被引量:1
  • 4[4]ISS Company. RealSecure Network Protection.http:∥www.iss.net/products_services/enterprise_protection/rsnetwork/index.php 被引量:1
  • 5[5]Ilgun K,Kemmerer R A,Porras P A.State transition a.nalysis:A rulebased intrusion detection approach[J].Software Engineering,IEEE Transactions on, 1995; 21 (3): 181 ~ 199 被引量:1
  • 6[6]Vigna G,Kemmerer R A.NetSTAT:A Network-based Intrusion Detection Approach[C].In:Proceedings of the 14th Annual Computer Security Applications Conference(ACSAC), 1998 被引量:1
  • 7[7]Alec Yasinsac. An Environment for Security Protocol Intrusion Detection[J].Journal of Computer Security,2002; (10): 177~188 被引量:1
  • 8[8]Shan Zheng,Chen Peng,Xu Ying et al.A network state based intrusion detection model. Computer Networks and Mobile[C].In:Computing,2001.Proceedings.2001 International Conference on,2001:481~486 被引量:1
  • 9[9]Karen Kent Frederick. Network Intrusion Detection Signatures,Part 5.http:∥online.securityfocus.com/infocus/1569,2002 被引量:1
  • 10[10]Stevens W R.TCP/IP Illustrated,Volume 1 :The Protocols[M].Addison Wesley, 1994 被引量:1

共引文献58

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部