首页 | 本学科首页   官方微博 | 高级检索  
     

自动入侵响应系统的研究
引用本文:丁勇,虞平,龚俭.自动入侵响应系统的研究[J].计算机科学,2003,30(10):160-162.
作者姓名:丁勇  虞平  龚俭
作者单位:东南大学计算机科学与工程系江苏省计算机网络技术重点实验室,南京,210096
基金项目:国家自然科学基金 (No.90104031)
摘    要:The emergence of automated and complex attacks imposes great threat on the network. The automated intrusion response system is able to take timely countermeasures to stop the attacks and decrease the loss of systems.This paper analyzes the several requirements of an ideal automated intrusion response system, introduces the general architecture of automated intrusion response systems, summarizes the possible countermeasures that make the basis of the research, and focuses on the introduction of three important techniques, including cost-sensitive model, plan recognition, and the self-adaptive technique. The combination of these techniques helps to construct a reasonable,timely, and self-adaptive automated intrusion response system. In the end of this paper, we make a brief introduction of the cooperation techniques that is used in large scale networks.

关 键 词:计算机网络  入侵检测系统  自动入侵响应系统  网络安全

A Study of Automated Intrusion Response Systems
DING Yong YU Ping GONG Jian.A Study of Automated Intrusion Response Systems[J].Computer Science,2003,30(10):160-162.
Authors:DING Yong YU Ping GONG Jian
Abstract:The emergence of automated and complex attacks imposes great threat on the network. The automated intrusion response system is able to take timely countermeasures to stop the attacks and decrease the loss of systems This paper analyzes the several requirements of an ideal automated intrusion response system, introduces the general architecture of automated intrusion response systems, summarizes the possible countermeasures that make the basis of the research, and focuses on the introduction of three important techniques, including cost-sensitive model, plan recognition, and the self-adaptive technique. The combination of these techniques helps to construct a reasonable, timely, and self-adaptive automated intrusion response system. In the end of this paper, we make a brief introduction of the cooperation techniques that is used in large scale networks.
Keywords:Automated intrusion response  Cost-sensitive model  Plan recognition  Self-adaptation  Cooperation  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号