期刊文献+

网络安全信息管理与分析系统研究与实现 被引量:7

Research and implementation of management and analysis system for network security information
下载PDF
导出
摘要 网络安全产品之间由于缺乏数据信息交换机制,导致了各自的安全信息不能彼此共享;同时为了解决网络上大量的报警和误报,这就需要找出网络检测数据深层次关系,并高效地检测已知、未知的攻击,由此提出了网络安全的信息管理与分析系统,同时给出了事件聚合、关联分析方法,提取关联规则,达到进一步聚合安全事件,从而达到全面分析的目的。 Because of the lack of data exchange mechanism, security product can't sharing the security information each other. In order to resolve the large volume of alarm message or false alarm, discovery the immanent relationship in detected data and effectively detect diversified attack, a network security management and analysis system is put forward, simultaneously, analytical method of data fusion and data association is discussed and the security event information can be gathered, all what are taken to achieve the all-around analysis about security information.
作者 王成 陈蜀宇
出处 《计算机工程与设计》 CSCD 北大核心 2007年第19期4625-4627,共3页 Computer Engineering and Design
基金 教育部"新世纪优秀人才支持计划"基金项目(NCET-04-0843)
关键词 网络安全 入侵检测 关联分析 聚类分析 概化 network security intrusion detection association analysis cluster analysis generalization
  • 相关文献

参考文献8

二级参考文献21

  • 1[1]GREEN J,MARCHETTE D,NORTHCUTT S.Analysis Techniques for Detecting Coordinated Attacks and Probes [ EB/OL].http:∥www.blacksheepnetworks.com/security/info/misc/coord.html,2004. 被引量:1
  • 2[2]ECKMANN ST,VIGNA G,KEMMERER PA.Statl:An attack language for state-based intrusion detection[ A].Proceedings of the ACM Working on Intrusion Detection[ C].2000. 被引量:1
  • 3[3]PENG N.Abstraction-based Intrusion Detection in Distributed Environments[D].George Mason University,2001. 被引量:1
  • 4[4]BRO PV.A system for detecting network intruders in real-time [A].Proceedings of the 7th Usenix Security Symposium[ C].1998. 被引量:1
  • 5S R Snapp, S E Smaha, D M Teal et al. The DIDS (distributed intrusion detection system) prototype. In: USENIX Association.Proc of the Summer 1992 USENIX Conf. Berkeley, CA, USA:USENIX Association, 1992. 227--233. 被引量:1
  • 6S Staniford-Chen, S Cheung, R Crawford et al. GrlDS---A graph based intrusion detection system for large networks. The 19th National Information Systems Security Conference (NISSC),Baltimore, MD, USA, 1996. 1:361-370. 被引量:1
  • 7J S Balasubramaniyan, J O Garcia-Fernandez, D Lsaeoff et al.Architecture for intrusion detection using autonomous agents.COAST Laboratory, Purdue University, COAST Tech Rep: 98-05, 1998. http://www. cerias. purdue.edu/homes/aafid/docs/tr9805, pdf. 被引量:1
  • 8P A Porras, P G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. The 20th National Information Systems Security Conf(NISSC), Baltimore,MD, USA, 1997.353-365. 被引量:1
  • 9J Pickel, R Danyliw. Enabling automated detection of security events that affect multiple administrative domains.Information Networking Institute, Carnegie Mellon University, Pittsburgh,PA, USA, 2000. http://www. incident.org/thesis/bookl. html. 被引量:1
  • 10C Krugel, T Toth. Distributed pattern detection for intrusion detection. The Network and Distributed System Security Symposium Conf, San Diego, CA, USA, 2002. 被引量:1

共引文献45

同被引文献56

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部