期刊文献+

基于Snort系统的网络入侵检测模型的研究

Improved intrusion eetection system model based on snort system
下载PDF
导出
摘要 网络入侵检测是网络安全领域研究的热点问题,通过应用分组交换检测机制和Markov链,提出基于Snort系统的IDS模型,设计Snort系统规则库和检测引擎。分析结果表明,改进模型和方法可以提高网络入侵检测中海量数据的检测准确率和效率。 Network intrusion detection is a hot research field of network security,We provide an imporved IDS model based on Snort System through the use of packet switching and Markov chain,and design snort-based rules and detection engine.The results show that the improved model and network intrusion detection methods can improve detection accuracy and efficiency for massive data.
作者 董忠
出处 《自动化与仪器仪表》 2010年第6期7-8,29,共3页 Automation & Instrumentation
关键词 入侵检测 SNORT系统 MARKOV链 模式匹配 Intrusion Detection System(IDS) Snort system Markov chain Pattern matching
  • 相关文献

参考文献5

二级参考文献47

  • 1尹清波,张汝波,李雪耀,王慧强.基于动态马尔科夫模型的入侵检测技术研究[J].电子学报,2004,32(11):1785-1788. 被引量:9
  • 2[1]Lindqvist U, Porras P A. Detecting Computer and Network Misuse Through the Production-based Expert System Toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy.Orkland California, 1999:146-161 被引量:1
  • 3[2]Hochberg J,Jackson K,Stallings C,et al.NADIR:An Automated System for Detection Network Intrusion and Misuse. Computer & Security, 1993,12(3): 235-248 被引量:1
  • 4[3]Smaha S E.Haystack:An Intrusion Detection System. In:Proceedings ofthe IEEE Fourth Aerospace Computer Security Applications Confe rence,Orlando,FL, USA,IEEE Computer Society Press, 1988:37-44 被引量:1
  • 5[4]Sebring M M,Shellhouse E,Hanna M E,et al. Expert Systems in Intrusion Detection:A Case Study. In Proceedings of the 1 lth National Computer Security Conference,Baltimore,Maryland,US A,NIST, 1988 被引量:1
  • 6[5]Lunt T F,Tamaru A,Gilham F,et aI.IDES:A Progress Report. In:Annual Computer Security Applications Conference,Tuscon,Arizona:IEEE Computer Society Press, 1990:273-285 被引量:1
  • 7[6]Forrest S,Hofmeyr S A,Somaya ii A,et al.A Sense of Self for Unix Processes.In:Proceedings of the 1996 IEEE Symposium on Security and Privacy,Orkland California, 1996:120-128 被引量:1
  • 8Ye N. A Markov chain model of temporal behavior for anomaly detection. In: Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000, 166~169 被引量:1
  • 9Jha S., Tan K., Maxion R.A., Roy A. Markov chains, classifiers and intrusion detection. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, 2001, 206~219 被引量:1
  • 10Hofmeyr S.A., Forrest S., Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3): 151~180 被引量:1

共引文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部