期刊文献+

基于IDMEF的协作式入侵检测技术研究 被引量:1

Research on the Cooperative Intrusion Detection Technology of Base-IDMEF
下载PDF
导出
摘要 介绍了入侵检测技术的发展和现状,阐述了协作式入侵检测技术中信息交换的产生背景和功能要求。主要讲述了如何利用入侵检测信息交换格式-IDMEF(Intrusion Detection Message Exchange Format)和入侵检测交换协议-IDXP(Intrusion Detection Exchange Protocol)来实现多个入侵检测系统之间的信息交换。 This article introduce the development of the Intrusion Detection Technology. It elucidates background of produce and requirement of function of information exchange of cooperative intrusion detection technology. Particularly discusses how to use IDMEF( Intrusion Detection Message Exchange Format) and IDXP (Intrusion Detection Exchange Protocol) to exchange the information among the intrusion detectionsystem.
出处 《微处理机》 2007年第5期34-37,共4页 Microprocessors
关键词 入侵检测交换协议 入侵检测消息交换格式 可扩展标记语言 块可扩展交换协议 IDXP IDMEF XML ( Extensible Markup Language ) BEEP ( Blocks Extensible Exchange Protocol)
  • 相关文献

参考文献5

二级参考文献23

  • 1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8 被引量:1
  • 2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4 被引量:1
  • 3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986 被引量:1
  • 4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232 被引量:1
  • 5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988 被引量:1
  • 6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997 被引量:1
  • 7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988 被引量:1
  • 8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988 被引量:1
  • 9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989 被引量:1
  • 10[1]Snapp R S,Brentano James,Dias V G, Terrance L,Goan L,Todd Heberlein, Ho Che-Lin, Levitt N, Biswanath Mukherjee, Stephen E Smaha Tim Grance, Teal M and Mansur Doug.DIDS (Distributed Intrusion Detection System)-Motivation,Architecture, and An Early Prototype.Computer Security Laboratory Division of Computer Science University of California,Davis 被引量:1

共引文献121

同被引文献14

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部