您的位置:首页 > 移动开发

[PDF]Intrusion Detection Techniques and Approaches

2007-11-10 14:51 405 查看


PDF : Click Here To Download

Abstract

Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and recognising normal and abusive system behaviour. Such methodologies include: statistical models, immune system approaches, protocol verification, file and taint checking, neural networks, whitelisting, expression matching, state transition analysis, dedicated languages, genetic algorithms and burglar alarms. This paper describes these techniques including an IDS architectural outline and an analysis of IDS probe techniques finishing with a summary of associated technologies.

Keywords: Intrusion detection, probe technique, scanning, anomaly detection, misuse detection,

modeling technique, honeynet, worm/virus attack
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: 
相关文章推荐