首页 | 本学科首页   官方微博 | 高级检索  
     

基于r-连续位匹配规则的入侵检测研究
引用本文:张虹,蔡焕夫,高平安,赵国红.基于r-连续位匹配规则的入侵检测研究[J].计算机工程与应用,2006,42(29):114-117.
作者姓名:张虹  蔡焕夫  高平安  赵国红
作者单位:1. 广东金融学院计算机科学与技术系,广州,510521
2. 中南大学信息科学与工程学院,长沙,410083
3. 国防科学技术大学计算机学院,长沙,410073
基金项目:国家自然科学基金;广东金融学院校科研和教改项目
摘    要:检测器匹配规则和匹配概率是入侵检测系统中构建检测器集和检测器进行有效检测的重要依据。Hofmeyr曾经提出一个基于r-连续位匹配规则的匹配概率分布公式,这个公式在构建检测系统时被广泛使用,但这个公式存在误差。因此提出一个更准确的基于该匹配规则的匹配概率分布公式将对入侵检测系统性能的改进有重要意义。从对这个匹配公式中两个参数r和l的取值范围分析可以得出影响入侵检测系统性能的某些因素。一个实现快速r-连续位匹配的算法的提出,解决了系统进行匹配运算时的时间开销问题。

关 键 词:计算机免疫  入侵检测  检测器  匹配规则  匹配概率
文章编号:1002-8331(2006)29-0114-04
收稿时间:2006-06
修稿时间:2006-06

Intrusion Detection Research Based on r-contiguous Bits Match Rule
ZHANG Hong,CAI Huan-fu,GAO Ping-an,ZHAO Guo-hong.Intrusion Detection Research Based on r-contiguous Bits Match Rule[J].Computer Engineering and Applications,2006,42(29):114-117.
Authors:ZHANG Hong  CAI Huan-fu  GAO Ping-an  ZHAO Guo-hong
Affiliation:1.Department of Computer Science and Technolgy,Guangdong University of Finance, Guangzhou 510521;2.School of Information Science and Engineering, Central South University,Changcha 410083;3.Department of Computer Science and Technolgy,National University of Defense Technology, Changsha 410073
Abstract:A more exact/correct probability expression is bright,which calculates the probability for a match between two randomly chosen strings based on the r-contiguous bits match rule.The probability is an important constituent of much work on an Intrusion Detection System(IDS).With a coefficient matrix Aij presented,the exact probability expression modifies an error in Hofmeryr's probability expression using the match rule,which is quoted widely in the IDS.According to the expression,the values of two parameters,r and l,will affect directly the match probability,and also be effective for modeling the receptor of detector set.So it is important to analyse the region of the parameters.Finally the speed of r-contiguous bits match rule algorithm will be presented.This is necessary because the r-contiguous match function is called once for each detector which is to test for recognition of each and every agent(connection)the program monitors.
Keywords:computer immune  intrusion detection  detectors  match rules  probability of a match
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号