期刊文献+

入侵检测系统系统性能参数的仿真法分析 被引量:3

Simulation Performance Analysis of Intrusion Detection System
下载PDF
导出
摘要 随着网络的发展和对网络安全的逐步重视,入侵检测系统的研究越来越受到关注。对于入侵检测系统的框架模型、采用的匹配策略和不同检测系统之间的协作模式等,都已经做了许多工作,并已经形成了相对统一的标准。但是,对入侵检测系统在实际操作中应该如何达到配置最优缺少相应的研究。该文运用非马尔科夫模型进行仿真模拟,指出影响入侵检测系统性能的几个关键参数,给出特定流量模式下达到最优性能的配置方法。采用与实际情况更为贴近的仿真模型,考虑更多的参数是今后研究发展方向。 With the development of Internet,more and more focuses have been put on network security.The research of intrusion detection system has attracted attention of many institutions.Many works on the model of IDS,match strategy and cooperation between several systems have been completed,but little research work has been done upon optimizing configuration of IDS in real environment.This paper uses non-Markov Model to simulating real IDS and gives several key parameters that have definitive effect on intrusion detection system's performance.According to the configuration method provided by this paper,one IDS can achieve a best performance in the specific environment.Using a more reality simulating system with more parameters being thought of is the research direction in the future.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第7期139-141,共3页 Computer Engineering and Applications
关键词 入侵检测系统 网络 排队论 非马尔科夫模型 IDS,Network,Queue theory,Non-Markov Model
  • 相关文献

参考文献3

  • 1[1]Wood M.Intrusion Detection Message Exchange Requirements. Intrusion Detection Exchange Format Working Group, 1999-10 被引量:1
  • 2[2]Gregory J Miller,Rick Wilder. Wide-Area Internet Traffic Patterns and Characteristics-IEEE-Kevin Thompson. MCI Telecommunications Corporation 被引量:1
  • 3[3]Thomas G Robertazzi. Computer Networks and Systems:Queueing Theory and Performance Evaluation 被引量:1

同被引文献26

  • 1侯滨,戴浩,王永强.入侵检测系统用户级测试案例[J].计算机安全,2004(6):38-42. 被引量:2
  • 2吕志军,金毅,赖海光,黄皓,谢立.DAPRA测试分析和IDS测试方法研究[J].计算机科学,2004,31(11):73-76. 被引量:4
  • 3The Shmoo Group. CaPture the CaPture the Flag Data [DB/OL]. [2006-04-11]. http: //cctf. shmoo, corn/. 被引量:1
  • 4PUKETZA N, ZHANG K, CHUNG M, et al. A Methodology for Testing Intrusion Detection Systems [ J ]. IEEE Transaction on Software Engineering, 1996, 22 (10) : 719-729. 被引量:1
  • 5RICHARD LIPPMANN, ROBERT K CUNNINGHAM. Results of the DARPA 1998 Off-Line Intrusion Detection Evaluation [R]. [S. l. ] : MIT Lincoln Laboratory, 1999. 被引量:1
  • 6MELL P, HU V, LIPPMANN R, et al. An Overview of Issues in Testing Intrusion Detection Systems [ R]. [ S. l. ] : National Institute of Standards and Technology, 2003. 被引量:1
  • 7TIAN Jun-feng, LIU Tao, JIAO Hong-qiang. Entropy Weight Coefficient Method for Evaluating Intrusion Detection Systems [ C ] //Electronic Commerce and Security, 2008 International Symposium on. Washington, DC, USA : IEEE Computer Society, 2008: 592-598. 被引量:1
  • 8DEBAR H, DACIER M, WESPI A, et al. An Experimentation Workbench for Intrusion Detection Systems [ R]. [ S. l. ] : IBM Zurich Research Laboratory, 1998. 被引量:1
  • 9SHIPLEY G. ISS RealSecure Pushes Past Newer IDS Players, Network Computing [ EB/OL]. (1999-05-17). http: //www. networkcomputing, com/1010/1010rl, html. 被引量:1
  • 10DEBAR H, DORIZZI B. An Application of a Recurrent Network to an Intrusion Detection System [ C ] //International Joint Conference on Neural Networks (IJCNN). Baltimore, MD, USA: Is. n. ], 1992: 478-483. 被引量:1

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部