期刊文献+

基于APC攻击分类的自适应测试模型研究 被引量:1

Research on Adaptative Test Model Based on Attack Classification of APC
下载PDF
导出
摘要 通过模拟黑客攻击,可以对IDS进行性能评估,测试它们的检测率、误报率,从而进一步完善其性能。针对现有IDS测试需大量手工操作的不足,提出一个以APC(地址信息A、协议状态P、连接状态C)攻击分类方法为依据的自适应测试模型。该模型利用事先建立攻击决策库和攻击数据库、各测试环节自动执行,可提高测试速度,使测试过程智能化;通过模拟黑客攻击,有效降低IDS的评估误差。经实验验证,该系统模型是实用有效的。 Simulating hack attack can be used to evaluate detection accuracy and false alarm rate of as Intrusion De tection System(IDS),so that can improve its performance.In order to overcome the disadvantages that IDS evaluation need a great deal of handwork,on account with an attack classification based on connection,APC Class,this paper puts forward an adaptative test model that facilitate simulating attack.The model make attack policy database and attack database in advance and make each part of model automatically execute so that speed up the test procedure and make the procedure intelligently,simulating hack attack can decrease the test error.After the analysis it is proved that the model is useful and effected.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第13期123-126,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60573050) 北京市优秀人才培养专项经费资助项目(编号:20042D0500103)
关键词 网络安全 性能测试 模型 攻击分类 Z方法 network security,performance test,model,attack classification,Z method
  • 相关文献

参考文献8

二级参考文献8

  • 1[5]Kumar S. Classification and Detection of Computer Intrusions [Ph D Dissertation ]. Purdue University,West L Afayette,USA,1 995. ftp:/ / coast. cs. purdue. edu/ pub/COAST/ papers/ sandeep- kumar/ kumar- intdet- phddiss. ps. Z 被引量:1
  • 2[1]Neumann P G, Parker D B. A Summary of Computer Misuse Techniq- ues. The 12th National Computer Security Conf. Baltimore, Maryland, USA, 1989: 369-407 被引量:1
  • 3[2]Landwehr C E, Bull A R, Mcdermott J P, et al. A Taxonomy of Computer Program Security Flaws, with Examples. Naval Research Laboratory,Tech Rep:9591 ,1993 被引量:1
  • 4[3]Howard J D. An Analysis of Security Incident on the Internet[Ph D Dissertation]. Carnegie Mellon University, West Lafayette,USA,1 995 被引量:1
  • 5[4]Indqvist U L, Jonsson E. How to Systematically Classify Computer Security Intrusions. IEEE Symposium on Security and Privacy. Oakland, 1997: 154-163 被引量:1
  • 6Jou Yfrank,Rome Lab USA Tech Rep:CDRL A005 1997 被引量:1
  • 7李腊元.通信协议形式化模型的研究[J].计算机学报,1998,21(5):419-427. 被引量:4
  • 8王晓程,刘恩德,谢小权.攻击分类研究与分布式网络入侵检测系统[J].计算机研究与发展,2001,38(6):727-734. 被引量:76

共引文献76

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部