| 研究生: |
陳忠鴻 Chen, Chung-Hung |
|---|---|
| 論文名稱: |
應用於入侵偵測之創新樣式搜尋演算法 New Pattern Search Algorithm for Intrusion Detection |
| 指導教授: |
黃宗立
Hwang, Tzonelih |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2004 |
| 畢業學年度: | 92 |
| 語文別: | 中文 |
| 論文頁數: | 56 |
| 中文關鍵詞: | 樣式比對 、入侵偵測 |
| 外文關鍵詞: | pattern match, intrusion detection |
| 相關次數: | 點閱:49 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著網路科技的日漸發達,資訊安全的重要性也漸漸地被大家所重視。透過網路傳遞的資料,都有被截斷或竊取的可能。現階段的網路安全策略,不再只是將防火牆或防毒軟體安裝完畢就可以高枕無憂;而是包括防火牆(Firewall)、完整認證功能、網路安全掃瞄檢查、以及動態網路安全入侵偵測系統(Intrusion Detection System,IDS)等一系列產品所共同組成的全方位網路安全完整解決方案,才能夠真正確保網路的安全性。藉由入侵偵測系統,可以即時的偵測入侵行為,進而提出適當的應對策略,其中如何有效率的偵測入侵,降低系統的誤判率,是我們在設計入侵偵測系統時,相當重要的一環。
在本篇論文當中提出的演算法,是利用樣式比對(Pattern Match)的方式來偵測惡意的入侵行為,而且具備有同時比對多筆樣式(Multi-Pattern)、降低誤判率(False-Positive)、順序性比對(Sequence Match)、容插控制(Insertion of the Pattern)等等特性,因此能夠有效率的偵測惡意入侵行為,加強整個網路環境的安全性。
none
[1] Andreas Wespi, Marc Dacier, Hervé Debar, and Medhi Nassehi, Audit trail pattern analysis for detecting suspicious process behavior, Proceedings of RAID 98, Workshop on Recent Advances in Intrusion Detection, 1998.
[2] Andreas Wespi, Marc Dacier, and Hervé Debar, Intrusion detection using variable-length audit trail patterns, Springer-Verlag, vol.1907, pages 110-29, 2000.
[3] Hervé Debar, Marc Dacier, Medhi Nassehi, and Andreas Wespi, Fixed vs. variable-length patterns for detecting suspicious process behavior, Springer, Proceedings 5th European Symposium on Research in Computer Security, pages 1-15, 1998.
[4] James P. Anderson, Computer Security Threat Monitoring and Surveillance, Technical report, 1980.
[5] Jean-Sébastien Coron, David Naccache, and Julien P. Stern, On the security of RSA padding, Advances in Cryptology, Crypto'99, pages 1-18, 1999.
[6] Josué Kuri and Gonzalo Navarro, Fast multipattern search algorithm for intrusion detection, Proceedings of the 2000 Seventh International Symposium on String Processing and Information Retrieval, 27-29, pages 169-180, 2000.
[7] Koral Ilgun, USTAT : A Real-Time Intrusion Detection System for UNIX, Proceedings of the 1993 IEEE Symposium on Security and Privacy, 1993.
[8] Ning Jiang, Kien A. Hua, and Simon Sheu, Consider both Intra-pattern and Inter-pattern anomalies for intrusion, Proceedings of the 2002 IEEE International Conference on Data Mining, pages 637-640, 2002.
[9] Ning Jiang, Kien A. Hua, and JungHwan Oh, Exploiting pattern relationship for intrusion detection, Proceedings of the 2003 IEEE Symposium on Applications and the Internet, pages 200-208, 2003.
[10] Paul E. Proctor, The practical intrusion detection handbook, Upper Saddle River, N.J., Prentice Hall Inc, 2001.
[11] Stephanie Forrest, Steven A. Hofmeyr, Anil Somahaji, and Thomas A. Longstaff, A sense of self for Unix process, Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128, 1996.
[12] Stephen Northcutt, Network intrusion detection : an analyst's handbook, Indianapolis, New Riders, 1999.
[13] Sandeep Kumar and Eugene Spafford, A Pattern Matching Model for Misuse Intrusion Detection, Proceedings of the 17th National Computer Security Conference, pages 11-21, 1994.
[14] Sandeep Kumar and Eugene Spafford, An Application of Pattern Matching in Intrusion Detection, Technical Report, Purdue University, 1994.
[15] Yuebin Bai and Hidetsune Kobayashi, Intrusion detection system : technology and development, Proceedings of the 17th International Conference on Advanced Information Networking and Applications, pages 710-715, 2003.