期刊文献+

基于高性能网络的入侵检测系统架构 被引量:8

Intrusion detection system based on high-performance networks
下载PDF
导出
摘要 通过对现有入侵检测系统的分析 ,给出了一种基于现代高性能网络的入侵检测系统 (HPIDS)架构 ,它具有两层的检测结构 ,能较好地适应网络体系结构的变化 ,方便地引入入侵检测研究领域的最新成果 ,并能有效地集成现有的入侵检测系统 .同时 ,两层的检测结构也能提高检测效率 .系统实现的关键技术包括过载响应策略和事件相关性分析 .过载响应策略提供三种机制进行系统配置 :服务确保机制、过载识别及分流机制和自动平衡机制 ,每种机制适用于不同的环境 . On the basis of the actuality of IDS, this paper describes a 2 hierarchy detection architecture of IDS based on high performance networks which can preferably accommodate the development of networks architecture, conveniently import the latest advances of research in intrusion detection and integrate the existing systems. At the same time, the efficiency of system detecting can be improved. The paper presents the key technologies on realizing the system as follows: response strategies of overloading and the analysis of event′s relativity. The response strategies of overloading provides three methods for system configure including assuring services, auto distributary after overloading recognition and auto balance. Every method will be used in its corresponding environment. The analysis of event′s relativity will help to improve detecting veracity.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2002年第3期4-6,共3页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
关键词 入侵检测系统 网络安全 高性能网络 HPIDS 检测结构 过载响应 系统配置 network security high performance networks intrusion detection HPIDS
  • 相关文献

参考文献4

  • 1[1]Vern P. Bro: A system for dtecting network intruders in real-time. Computer Networks, 1999, 31: 2 435~2 463 被引量:1
  • 2[2]Huang Mingyuh, Robert J J, Thomas M W. A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks, 1999, 31: 2 465~2 475 被引量:1
  • 3[3]Eugene H, Diego Z. Intrusion detection using autonomous agents. Computer Networks, 2000, 34: 547~570 被引量:1
  • 4[4]Ning P, Wang X S, Jajodia S. Modeling requests among cooperating intrusion detection systems. Computer Communications, 2000, 23: 1 702~1 715 被引量:1

同被引文献20

  • 1陆雪莹.TCP/IP详解(卷2)[M].北京:机械工业出版社,2000.. 被引量:1
  • 2Bian Zhaoqi,Yan Pingfan,Yang Cunrong,Pattern Recognition.Beijing:Tsinghua University Press,1998(in Chinese) 被引量:1
  • 3Doak,Justin.Intrusion detection:the application of feature select1on--a comparison of Algorithms,and the application of a wide area network analyzer[MS Thesis].Department of Computer Science,University of California,Davis,1992 被引量:1
  • 4Pukerza N,Chung M,Ol sson R A,et a1.A software platform for testing intrusion detection system[J],IEEE Software,1997,14(5):43-51 被引量:1
  • 5张强.入侵检测和漏洞检测系统[EB/OL].来自“IDS入侵检测系统国家IT认证实验室”网站http://www.chinaitlab.com.,. 被引量:1
  • 6余波.典型的入侵检测系统[EB/OL].来自“IDS入侵检测系统国家IT认证实验室”网站http://www.chinaitlab.com.,. 被引量:1
  • 7胡昌振,李贵涛.面向21世纪网络安全与防护[M].北京:希望电子出版社,2010. 被引量:1
  • 8孙海彬,徐良贤,杨怀银.对网络入侵检测系统的攻击及防御计算机工程与应用[J].科技风,2012(13). 被引量:1
  • 9冯春辉,冯连勋.基于数据挖掘的入侵检测系统设计和实现[J].微计算机信息,2008,24(33):61-62. 被引量:4
  • 10乜国雷.计算机网络服务器的入侵与防御研究[J].自动化与仪器仪表,2011(4):166-168. 被引量:6

引证文献8

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部