首页 | 本学科首页   官方微博 | 高级检索  
     

基于网络安全知识库的入侵检测模型
引用本文:肖云,王选宏.基于网络安全知识库的入侵检测模型[J].计算机应用研究,2009,26(3):1079-1081.
作者姓名:肖云  王选宏
作者单位:1. 西北大学,信息科学与技术学院,西安,710127
2. 西安邮电学院,通信工程系,西安,710121
基金项目:国家“863”计划资助项目(2004AA1Z2280)
摘    要:在网络安全知识库系统的基础上,提出一个基于网络安全基础知识库系统的入侵检测模型,包括数据过滤、攻击企图分析和态势评估引擎。该模型采用进化型自组织映射发现同源的多目标攻击;采用时间序列分析法获取的关联规则来进行在线的报警事件的关联,以识别时间上分散的复杂攻击;最后对主机级和局域网系统级威胁分别给出相应的评估指标以及对应的量化评估方法。相比现有的IDS,该模型的结构更加完整,可利用的知识更为丰富,能够更容易地发现协同攻击并有效降低误报率。

关 键 词:网络安全  知识库  入侵检测模型  关联  威胁评估
收稿时间:6/20/2008 9:08:21 PM
修稿时间:2/2/2009 1:52:36 PM

Intrusion detection framework based on network security knowledge databases
xiao yun,wang xuan-hong.Intrusion detection framework based on network security knowledge databases[J].Application Research of Computers,2009,26(3):1079-1081.
Authors:xiao yun  wang xuan-hong
Affiliation:1.School of Information Science & Technology;Northwest University;Xi'an 710127;China;2.Dept.of Communicate Engineering;Xi'an Institutes of Post & Telecommunications;Xi'an 710121;China
Abstract:A new intrusion detection framework based on the existing network security knowledge databases was This paper proposed a new intrusion detection framework based on the existing network security knowledge databa-ses. It included data filtering, attack attempt analyzing and threat evaluation engines. The evolving self-organizing map was used to find attacks with same source and multi targets. Time series analysis method was utilized to obtain correlation rules to correlate intrusion events on-line, so the complicated attacks with disperse attack times could be checked. Then the threat evaluation indexes and quantitative threat evaluation formulas for evaluating serves, hosts and local area network were given. The framework is more integrated and has more useful knowledge than existing intrusion detection system (IDS) and easier to find coordinated attacks with lower false positive rate.
Keywords:network security  knowledge datasets  intrusion detection framework  correlation  threat evaluation
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号