[PDF]Intrusion Detection Techniques and Approaches

本文探讨了入侵检测系统(IDS)中的关键技术和探针技术。随着安全事件频发,手动响应攻击已不再可行。文章概述了多种IDS技术,包括统计模型、免疫系统方法、协议验证等,并分析了这些技术在检测异常行为和滥用行为中的应用。

 

PDF : Click Here To Download

Abstract

Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and recognising normal and abusive system behaviour. Such methodologies include: statistical models, immune system approaches, protocol verification, file and taint checking, neural networks, whitelisting, expression matching, state transition analysis, dedicated languages, genetic algorithms and burglar alarms. This paper describes these techniques including an IDS architectural outline and an analysis of IDS probe techniques finishing with a summary of associated technologies.

Keywords: Intrusion detection, probe technique, scanning, anomaly detection, misuse detection,
modeling technique, honeynet, worm/virus attack

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值