期刊文献+

基于IDS报警和rootkit的威胁溯源方法研究 被引量:1

Research on Threat Traceback Method Based on IDS Alarms and Rootkit
下载PDF
导出
摘要 随着互联网应用的普及和不断深入,网络威胁也给人们的工作和生活带来了重大挑战。为了应对这些挑战,给广大网民营造一个安全、可信的互联网环境,文章研究了威胁信息溯源问题,分析了现有威胁溯源方法存在的不足,从实践角度出发提出了一种基于入侵检测系统报警信息和rootkit的威胁溯源方案。文章设定了本方案的假设条件,分析了该方案的可行性,指出了方案面临的挑战。 With the popularization and development of Internet application, Internet-based network threat has posed a serious challenge to everyone's work and life. In order to deal with this challenge as well as create a safe and trusted Internet environment for the cyber citizens, this paper reads up the problem of threat information traceback, analyzes the drawbacks of the existing method of threat traceback, proposes a threat traceback scheme which is based on the alarms of intrusion detection system and rootkit technology. This paper sets up the assumption of the scheme according to the fact when traceback threat, analyzes the feasibility, proposes the challenge.
出处 《信息网络安全》 2015年第9期231-235,共5页 Netinfo Security
基金 国家自然科学基金[61172072 61271308] 北京市自然科学基金[4112045]
关键词 威胁溯源 入侵检测 ROOTKIT threat traceback intrusion detection rootkit
  • 相关文献

参考文献23

  • 1LU G, ZHONG H L, ZHANG Y, et al. Automatically Mining Application Signatures for Lightweight Deep Packet Inspection[J]. Network Technology and Application, 2013, 10(6): 86-99. 被引量:1
  • 2LENKA R K, RANJAN P. A Comparative Study on DFA- Based Pattern Matching for Deep Packet Inspection[C]//2012 Third International Conference on Computer and Communication Technology, 2012: 255-260. 被引量:1
  • 3VASHIST A, POYLISHER A, GHOSH A, et al. Managing high volume data for network attack detection using real-time flow filtering[J]. Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications, 2013, 10(3): 56-66. 被引量:1
  • 4ISO/IEC. Information technology - Open Systems Interconnection- Basic Reference Model: The Basic Model[EB/OL]. http:// www.iso.org/iso/iso catalogue/catalogue tc/catalogue_detail. htm?csnumber=20269. 被引量:1
  • 5SILVA S S C, SILVA R M P, PINTO R C G, et al. Bomets: A survey[J]. Computer Networks, 2013, 57(2): 378-403. 被引量:1
  • 6ZHAO D, TRAORE I, SAYED B, et al. Botnet detection based on traffic behavior analysis and flow intervals[J]. Computers & Security, 2013,39(4): 2-16. 被引量:1
  • 7WEBER T. Criminals may overwhelm the web[N]. BBC News, 2007-02-25. 被引量:1
  • 8RFC 2827 Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing[S]. Network Working Group, 2000. 被引量:1
  • 9SAVAGE S, WETHERALL D, KARLIN A, et al. Network Support for IP Tracehack[J]. IEEE/ACM Transactions on Networking, 2001, 9(3): 226-237. 被引量:1
  • 10STONE R. CenterTrack: An IP overlay network for tracking DoS floods[C]//in Proc. 2000 USENIX Security Syrup, 2000: 199-212. 被引量:1

二级参考文献125

  • 1Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页 被引量:1
  • 2刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页 被引量:1
  • 3Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年 被引量:1
  • 4Bian Zhaoqi,Pattern Recognition,1988年 被引量:1
  • 5边肇祺,模式识别,1988年 被引量:1
  • 6何华灿,人工智能导论,1988年 被引量:1
  • 7Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页 被引量:1
  • 8Snort官方网站TheSnortBlog[EB/OL]http://wwwsnort.org. 被引量:1
  • 9王景.新基于神经网络技术的网络入侵检测系统研究与实现[D].长沙:国防科技大学,2002. 被引量:1
  • 10DouglasC.Schmidt,StephenD.Huston.C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks (C++ln- DepthSeries)[M]. Addison-Wesley Professional, 2002. 被引量:1

共引文献428

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部