【24h】

Intrusion Detection System Models

机译:入侵检测系统模型

获取原文

摘要

The recent dramatic increase in the number of malicious Internet and computer attacks has prompted a great interest in the research of intrusion detection (ID). As the first line of defense for computer and network systems, intrusion detection systems (IDSs) have been deployed more and more widely. Behind each IDS is an intrusion detection model which dictates to some extent the capability and the performance of the system. In this paper, we examine, analyze, and compare the prominent intrusion detection models from the literature in order to show the state-of-the-art IDS technology. ID models are based on two distinct detection approaches: misuse detection and anomaly detection. This paper also discusses how to select ID models for intrusion detection system development and throws light on the direction of further research in ID.
机译:最近恶意互联网和计算机攻击数量的戏剧性增加促使对入侵检测(ID)的研究感兴趣。作为计算机和网络系统的第一行防御,入侵检测系统(IDS)已经越来越广泛地部署。在每个ID后面都是一种入侵检测模型,在某种程度上决定了系统的能力和性能。在本文中,我们研究,分析和比较文献中突出的入侵检测模型,以展示最先进的IDS技术。 ID模型基于两个不同的检测方法:误用检测和异常检测。本文还讨论了如何选择入侵检测系统开发的ID模型,并在ID中进一步研究方向抛出光线。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号