期刊文献+

入侵检测研究现状及其发展 被引量:1

Situation and Tendency of Intrusion Detection Research
下载PDF
导出
摘要 阐述入侵检测的基本原理和系统结构,介绍了当前入侵检测的主流技术及其优缺点,对于目前较流行的各种逃避检测和隐藏入侵的方式进行了探讨并指出对策。最后,介绍了当前国内外入侵检测研究的技术热点。 Firstly we describe the elementary components of intrusion detection systems and it's function and structure. Then the popular testing technology and its shortages are introduced in this paper.Secondly,weanalysis several ways to evade the detection of IDS that are always used by intruders at present,and provide the countermeasure for them.At last,we introduce some popular detective technology by which the IDS research have get outstanding achievement in some foreign and native country.
出处 《重庆工业高等专科学校学报》 2003年第3期31-34,共4页 Journal of Chongqing Polytechnic College
关键词 IDS 原理 结构 检测技术 入侵隐藏 Intrusion Detection System Components and Functions Structure Detective Technology Evadingthe Detection of IDS
  • 相关文献

参考文献6

二级参考文献40

  • 1周明天 王文勇.TCP/IP网络原理与技术[M].北京:清华大学出版社,1998.. 被引量:12
  • 2姜泉.IDS:安全新亮点[J].计算机世界,2001,4. 被引量:1
  • 3王怀滨 李好.入侵检测系统(IDS)介绍[J].上海微型计算机,2000,(259). 被引量:1
  • 4[5]Porras P, Kemmerer R.Penetrations State Transition Analysis A Rule-Based Intrusion Detection Approach. In:Proc. of the 8th Annual Computer Security Applications Conf. San Antonio,Texas,Dec. 1992 被引量:1
  • 5[6]Dennign D. An Intrusion Detectoin Model. IEEE Transactions on Software Engineering,1987,13(2):222~232 被引量:1
  • 6[7]Ko C,et al. Executoin Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In:Proc. of the IEEE Symposium on Security and Privacy, 1997 被引量:1
  • 7[8]Kosoresow A,Hofmeyr S. Intrusion Detection via System Call Traces. IEEE Software, 1997,14(5):35~41 被引量:1
  • 8[9]Forrest S,et al. A Sense of Self for Unix Processes. In:IEEE Symposium on Security and Privacy,Oakland, 1996 被引量:1
  • 9[10]Debar H,et al. Fixed vs. variable-Length Patterns for Detecting Suspicious Process Behavior. In: 5th European Symposium on Research in Computer Security(ESORICS'98),1998.1~15 被引量:1
  • 10[11]Wespi A,et al. Audit Trail Pattern Analysis for Detecting Suspicious Process Behavior. In: Proc. of the 1st Workshop on the Recent Advances in Intrusion Detection(RAID'98),Louvainla-Neuve,Belgium,Sept. 1998. 14~16 被引量:1

共引文献93

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部