网络安全与防护技术的研究及应用――模式匹配算法和入侵检测系统的研究与应用

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

西北工业大学硕士学位论文网络安全与防护技术的研究及应用——模式匹配算法和入侵检测系统的研究与应用姓名:张云鹏申请学位级别:硕士专业:计算机软件与理论指导教师:胡飞20050901网络安全与防护技术的研究及应用——模式匹配算法和入侵检测系统的研究与应用作者:张云鹏学位授予单位:西北工业大学参考文献(89条)1.TennenhouseDL.SmithJM.SincokieWDAsurveyofactivenetworkresearch[外文期刊]1997(01)2.ActiveNetworksworkingGroupArchitecturalframeworkforactivenetworks(Version1.0)20003.ComputerEvidenceProcessingGuidelines20024.LanceSpitznerHoneypotsDfinitionsandValueofHoneypots20015.CarlELandwehr.AlanRBull.JohnPMcdermott.WilliamS.ChoiATaxonomyofComputerProgramSecurityFlaws,withExamples,NRLReport9591,NavalResearchLaboratory,(November1993)6.AbbottRP.ChinJSSecurityanalysisandenhancementsofcomputeroperatingsystems19767.BisbeyIIR.HollingworthDProtectionAnalysisProjectionFinalReport19788.IvanKrsul.EHSpaffordComputerVulnerabilityAnalysis19989.PeterGNeumann.DonnBParkerASummaryofComputerMisuseTechniques198910.UifLindqvist.ErlandJonssonHowtoSystematicallyClassifyComputerSecurityIntrusions199711.JohnDHowardAnAnalysisofSecurityIncidentontheInternet199712.FredCohenInformationSystemDefenses:APreliminaryClassificationScheme1997(02)13.FredCohenInformationSystemAttack:APreliminaryClassificationScheme1997(02)14.SandeepKumarClassificationandDetectionofComputerIntrusions199515.EdwardGAmorosoFundamentalsofComputerSecurityTechnology199416.MattBishopATaxonomyofUNIXSystemandNetworkVulnerabillities199517.Mattbishop.DavidBaileyACriticalAnalysisofVulnerabilityTaxonomies199618.TaimurAslam.IvanKrsulUseofATaxonomyofSecurityFaults199619.AndersonJPComputersecuritythreatmonitoringandsurveillance198020.SpaffordECrisisandaftermath1989(06)21.SmahaSEHaystack:anintrusiondetectionsystem199822.HeadyR.LugerG.MaccabeAThearchitectureofanetworkevelintrusiondetectionsystem199023.DebarH.DacierMAndreaswespitowardsataxonomyofintrusion-detectionsystems1999(08)24.LuntTF.JagannathanR.EdwardsDLIDES-theenhancedprototypearemtimeintrusion-detectionexpertsystem198825.查看详情26.查看详情27.查看详情28.ChenS.TungB.SchnackenbergDThecommonintrusiondetectionframework-dataformats199829.DoakJustinIntrusiondetection:theapplicationoffeatureselection-acomparisonofalgorithms,andtheapplicationofawideareanetworkanalyzer199230.KumarGClassificationanddetectionofcomputerintrusions199531.CarlaTL.BrodleyETemporalsequencelearninganddatareductionforanomalydetection199832.黑客+病毒:杀毒软件遭遇后病毒时代33.边肇祺.张学工模式识别198834.何华灿人工智能导论198835.CarlaTL.BroaleyEDetectingtheabnormal:machinelearningincomputersecurity199736.LuntTF.TamaruA.GilhamFAreal-timeintrusiondetectionexpertsystem(IDES)199237.查看详情38.查看详情39.查看详情40.查看详情41.胡侃.夏绍玮基于大型数据仓库的数据采掘:研究综述[期刊论文]-软件学报1998(1)42.阮耀平.易江波.赵战生计算机系统入侵检测模型与方法[期刊论文]-计算机工程1999(9)43.StefanosM.MarvinC.DanZ.Keith,HAdatamininganalysisofRTIDalarms199844.WenkeLee.SalvatoreJStolfo.KuiWMokADataMiningFrameworkforBuildingIntrusionDetectionModel199845.HgunKUSTAT:areal-timeintrusiondetectionsystemforUNXX199246.NetRangerIntrusionDetectionSystem47.袁磊Linux平台下利用JNI+双向RMI实现远程推送48.RealSecureIntrusiondetectionsystem49.AllenJ.ChristieA.FithenW.McHugh,J.Pickel,J.Stoner,EStateofthePractiocofIntrusionDetectionTechnologies,CMU/SEI-99-TR-028ADA37584650.查看详情51.张然.钱德沛.过晓兵防火墙与入侵检测技术[期刊论文]-计算机应用研究2001(1)52.AndrewSTanenbaumComputerNetworks199653.MarcoDevivo.CabrielaODevivoInternetVulnerabilitiesRelatedtoTCP/IPandT/TCP199954.SMBellorinSecurityProblemsintheTCP/IPSuite1989(02)55.YFrankJou.ShyhtsunFelixWuArchitectureDesignofaScalableIntrusionDetectionSystemfortheEmergingNetworkInfrastructure199756.EEugeneSchultz网络安全事件相应200257.许榕生网络安全发展与研究现状[期刊论文]-信息安全与通信保密2002(11)58.赵战生信息安全保障的技术需求和发展200259.王德秀网络安全技术及应用[期刊论文]-有线电视技术2003(1)60.查看详情200261.许榕生网络入侵取证与陷阱技术200262.王建国.李增智.王宇.寇雅楠通用的主动网络安全机制[期刊论文]-西安交通大学学报2002(8)63.李双其对网络犯罪一些基本问题的认识200364.吴懿慧一种分布式入侵检测模型的研究与实现[学位论文]硕士200265.王晓程分布式网络入侵检测系统DNIDS的设计与实现[学位论文]硕士200066.PaulHelman.StephanieForrestAnEfficientAlgorithmforGeneratingRandomAntibodyStrings199467.MartinRoeschSnort-LithtweithtIntrusionDetectionforNetworks199968.VernPaxsonBroASystemforDetect-ingNetworkIntrudersinReal-Time199969.CCompton.DTennenhouseCollaborativeloadsheddingformedia-basedapplications199470.RichardAKemmerer.GiovanniBignaIntrusionDetection:ABriefHistoryandOverview200271.查看详情200372.BrunoRPreiss数据结构与算法--面向对象C++设计模式200073.张绍莲模式匹配与协议分析结合的网络入侵检测模型[学位论文]硕士200274.BoyerRS.JSMooreAfaststringsearchingalgorithm197775.KnuthDE.JHMorris.VRPrattFastpatternmatchinginstrings197776.Commentz-WalterAstringmatchingalgorithmfastontheaverage199777.WuS.UManberAgrep-AFastApproximatePattern-MatchingTool199278.姚立红.訾小超.张绍莲.谢立一种高效的多目标串匹配算法[期刊论文]-计算机应用与软件2004(1)79.TFLuntAutomatedAuditTrailAnalysisandIntrusionDetection198880.DeanEngelhardtDirectionsforIntrusionDetectionandResponse:ASurvery199781.王晓程.刘恩德.谢小权网络入侵检测系统概述2000(05)82.BCommentz-WalterAstringmatchingalgorithmfastonaverage197983.SHAHN.PLISHKERW.KEUTZERKNP-Click:AprogrammingmodelfortheintelIXP1200200384.SNORT85.NessusTransferProtocolWhitePaper86.HarrellJ.CannadyJ.HugginsDAModelforanAttackDatabaseSystem87.HORSPOOLRNPracticalfastsearchinginstrings.Softw.Pract.Experience,10,6,501-506198088.查看详情89.宋华.戴一奇入侵检测中一种新的快速字符串匹配算法[期刊论文]-计算机工程与应用2003(32)本文链接:

1 / 76
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功