期刊文献+

入侵检测系统研究 被引量:2

Research on Intrusion Detection System
下载PDF
导出
摘要 入侵检测是网络安全技术研究的一个新方向,入侵检测的重点是采用何种检测方法来有效地提取特征数据并准确地分析出非正常网络行为,入侵检测系统是完成对计算机和网络资源上的恶意使用行为进行识别和响应处理的独立系统。文章首先简述了入侵检测系统的发展历史背景及其重要性.然后通过分析常用的各种入侵检测方法的优缺点,指出目前的入侵检测系统存在的不足及其今后的发展趋势。 Intrusion detection is a newly developed network security technology. The main issue in this area is using which detection method to pick-up and analyze the information which contains abnormal network behavior characteristic. Intrusion Detection System is a special system and can identify the baleful behavior of u-sing computer resource and network resource and response to deal with this. This paper gives a brief history review of the development of the Intrusion Detection System with emphasis on its importance and then, based on the comparison of advantages and disadvantages of each detection method, points the problem of Intrusion Detection System and its future direction.
出处 《株洲工学院学报》 2002年第6期44-47,共4页 Journal of Zhuzhou Institute of Technology
关键词 入侵检测系统 网络安全技术 异常检测 误用检测 IDS intrusion detection system network security technology abnormal detection misuse detection
  • 相关文献

参考文献6

二级参考文献14

  • 1[1]Lee Wenke, Stolfo S J. Data mining approaches for intrusion detection. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998 被引量:1
  • 2[2]Lee Wenke, Stolfo S J, Mok K W. A data mining framework for building intrusion detection models. In: Proc the 1999 IEEE Symposium on Security and Privacy, Berkely, California, 1999. 120-132 被引量:1
  • 3[3]Lee Wenke. A data mining framework for constructing features and models for intrusion detection systems[Ph D dissertation]. Columbia University, 1999 被引量:1
  • 4[4]Paxson Vern. Bro: A system for detecting network intruders in real-time. In: Proc the 7th USENIX Security Symposium, San Antonio, TX, 1998 被引量:1
  • 5[5]Agrawal Rakesh, Srikant Ramakrishnan. Fast algorithms for mining association rules. In: Proc the 20th International Conference on Very Large Databases, Santiago, Chile, 1994 被引量:1
  • 6[6]Agrawal Rakesh, Srikant Ramakrishnan. Mining sequential patterns. IBM Almaden Research Center, San Jose, California:Research Report RJ 9910, 1994 被引量:1
  • 7[7]Chen M, Han J, Yu P. Data mining: An overview from database perspective. IEEE Trans Knowledge and Data Engineeing, 1996,8(6):866-883 被引量:1
  • 8[1]Denning D E.An Intrusion-detection Model.IEEE Transactions on Software Engineering,1987,13(2) 被引量:1
  • 9[2]Anderson D,Frivold T H,Valdes A.Next-generation Intrusion-Detection Expert System(NIDES):A Summary.SRI-CSL-95-07,SRl International,Menlo Park,CA,1995-05 被引量:1
  • 10[3]Lee W,Stolfo S J.Data Mining Approaches for Intrusion Detection.In Proceeding of the 7th USENIX Security Symposium,San Antonio,TX,1998-01 被引量:1

共引文献191

同被引文献7

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部