1 / 48
文档名称:

协同式入侵监测系统(CIDS)地研究——基于攻击树的协同入侵建模.pdf

格式:pdf   页数:48页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

协同式入侵监测系统(CIDS)地研究——基于攻击树的协同入侵建模.pdf

上传人:beny00001 2015/11/8 文件大小:0 KB

下载得到文件列表

协同式入侵监测系统(CIDS)地研究——基于攻击树的协同入侵建模.pdf

相关文档

文档介绍

文档介绍:上海交通大学工程硕士研究生学位论文
ABSTRACT

With the development puter technology and the explosion of ,
computer security es more and more important. Annual reports from the
Computer Emergency Response Team (CERT) indicate a significant increase in
the number puter security incidents each year.
A narrower definition puter security (or information security) is based
on the realization of confidentiality, integrity, availability and controllability in a
computer system. There are many measures puter security, such as
access control, encryption, auditing, authentication, etc. However, completely
preventing breaches of security appear, at present, unrealistic. We can, however,
try to detect these intrusion attempts so that action may be taken to repair the
damage later. This field of research is called Intrusion Detection. An intrusion is
defined as any set of actions that attempt promise the integrity,
confidentiality, availability, or controllability of a resource. Intrusion detection is
defined as "the problem of identifying individuals who attempt to use puter
system without authorization and those who have legitimate access to the
system but are abusing their privileges". An intrusion detection system (IDS) is a
computer system that attempts to perform intrusion detection. Coordinated
intrusion detection gives emphasis on the finding the relations among the
intrusion events, which may are initiated by different attackers from different
hosts at different time.
In Chapter 1, related term and related concepts are introduced, such as
Computer Security, Network Security and Intrusion Detection.
In Chapter 2, the classification of intrusion detect is introduced in detail.
Then the work done by some anization (CIDF and IDWG) is
introduced. In the end, we discuss the distributed IDS and divide it into two
categories.
In Chapter 3, the concept of attack trees is introduced first. Then based on
the attack tree model, an atta