期刊文献+

用有限状态图来识别系统入侵 被引量:14

Intrusion Detection System Based on State Transferring Diagram
下载PDF
导出
摘要 文章首先对系统入侵的状态转换进行了研究,通过使用有限状态图的分析方法,分析识别了常见黑客攻击的特征,包括ROOT用户攻击、TCPSYNFLOODING、IP分片攻击等等;最后根据对系统入侵的状态转换图的研究和对攻击特征的分析设计了一个入侵检测系统。 This paper focuses on system intrusion detection by using State Transferring Diagram.Typically,we analyze some famous attacking method,such as TCP SYN FLOODING,IP FRAGMENT OVERLAP,SUPERUSER DISGUISE and so on.At last,we design an intrusion detection system based on state transferring analysis.
出处 《计算机工程与应用》 CSCD 北大核心 2001年第20期81-84,共4页 Computer Engineering and Applications
关键词 系统入侵 有限状态图 网络安全 防火墙 入侵检测系统 计算机网络 State Transferring,Intrusion Detection,State Transferring Diagram
  • 相关文献

参考文献5

  • 1[1]Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks[M].By the consultants of the Network Security Solutions Ltd. Front-line Information Security Team(FIST), 1998.12 被引量:1
  • 2[2]Abdelaziz Mounji.Languages and Tools for Rule-Based Ditributed Intrusion Detection.The degree of Doctor of Computer Science Department of Facultes University,Belgioum,1997.9 被引量:1
  • 3[3]Request For Comments 791,792,793 被引量:1
  • 4[4]Calvin Ko,George Fink,Karl Levitt. Automated Detection of vunerabilities in Privileged Programs by Execution Monitoring[M].Depet.of Computer Seience,Davice,University of California 被引量:1
  • 5[5]Karyn Piehnarczyk,Steve Weeber,Riehard Feingold. Unix Incident Guide:How to Detect an Intrusion[S].CIAC-2305 R.1 被引量:1

同被引文献59

引证文献14

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部