期刊文献+

协同入侵检测研究现状与展望 被引量:1

Research and prospect of collaborative intrusion detection system
下载PDF
导出
摘要 协同入侵检测技术(collaborative intrusion detection system,CIDS)能够检测分布式协同攻击,应对大规模网络入侵,拥有传统入侵检测系统所不具备的优势,而如何在提高检测性能的同时实现去中心化是一个重要的研究课题。通过对近年来CIDS研究成果的梳理,阐述了在检测方法、数据聚合、隐私保护和信任管理方面的研究进展和问题,分析了在去中心化方面面临的挑战,探讨了基于区块链技术的CIDS未来发展方向,最后展望了CIDS在云计算、物联网等新兴领域的应用前景。 Collaborative intrusion detection system(CIDS)can detect distributed cooperative attacks and deal with large-scale network intrusion.It has the advantages that traditional intrusion detection systems do not have.How to improve the detection performance while achieving decentralization is an important research topic.Through reviewing the research achievements of CIDS in recent years,this paper expounded the research progress and problems in detection methods,data aggregation,privacy protection and trust management,analyzed the challenges faced in decentralization,discussed the future development direction of CIDS based on blockchain technology.Finally this paper looked forward to the application prospects of CIDS in cloud computing,the Internet of Things and other emerging fields.
作者 汪永好 李志成 田雨禾 董子超 Wang Yonghao;Li Zhicheng;Tian Yuhe;Dong Zichao(Dept.of Cyberspace Security,Beijing Electronic Science&Technology Institute,Beijing 100070,China)
出处 《计算机应用研究》 CSCD 北大核心 2023年第6期1614-1620,1647,共8页 Application Research of Computers
关键词 入侵检测 协同入侵检测 深度学习 联邦学习 区块链技术 intrusion detection collaborative intrusion detection deep learning federal learning blockchain technology
  • 相关文献

参考文献6

二级参考文献34

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 21,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html 被引量:1
  • 32,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370 被引量:1
  • 43,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48 被引量:1
  • 54,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23 被引量:1
  • 65,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96 被引量:1
  • 76,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997 被引量:1
  • 87,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997 被引量:1
  • 9殷锋社.基于网络引擎入侵检测系统的研究与实现[J].电子设计工程,2011,19(7):92-95. 被引量:2
  • 10王蒙蒙,刘建伟,陈杰,毛剑,毛可飞.软件定义网络:安全模型、机制及研究进展[J].软件学报,2016,27(4):969-992. 被引量:87

共引文献147

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部