期刊文献+

基于有穷自动机的网络扫描检测算法研究与实现 被引量:9

Research of a Network Scan Detection Algorithm Based on the FSA Model
在线阅读 下载PDF
导出
摘要 网络扫描通常是入侵的前奏,准确的检测网络扫描可以对网络入侵起到重要的预警作用.现有的网络扫描检测机制都过于简单且易于被攻击者逃避.提出了一种基于有穷自动机模型检测网络扫描的入侵预警算法(FSA-based intrusion pre-alert algorithm,SBIPA),用自动机状态迁移图表达扫描报文序列,同时设计了3种不同的机制基于自动机模型对扫描事件进行检测,并讨论了算法实现中的关键技术.实验表明,该算法能在更准确的检测普通扫描的同时,对分布式、多类型混杂扫描等现有技术难以检测的隐蔽扫描也有很好的检测效果,有效弥补了现有同类技术的不足. Network scan is often the prelude of the network intrusion. Thus precise detection of the network scan plays an important role in the pre-alert of the network intrusion. But the current scan detection technologies are too simple and may be evaded by attackers easily. In this paper, based on the analysis of both the scan and detection technologies, a detection algorithm called SBIPA (FSA-based intrusion pre-alert algorithm) is proposed based on the FSA (finite state automata) model and the key implementation technology is analyzed. The state transfer diagram is used to illustrate the network scan packet series, and three different mechanisms are designed to detect the scan event based on FSA. Experiment reveals that this algorithm not only can detect the single type scan activity more precisely, but also can detect the unobvious scan such as distributed and multi-type mixed scan very well, which can't be detected by other detection technologies. It is believed that it eliminates the limitations of the current scan detection technology and has an important research and practice value.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第3期417-422,共6页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2001AA110485 2001AA110233 2001AA144150) 国家自然科学基金项目(60073006)~~
关键词 网络扫描 入侵预警 自动机 检测算法 network scan intrusion pre-alert , FSA detection algorithm
  • 相关文献

参考文献7

  • 1J. Allen, A. Christie, A. Fithen, et al. State of the practice of intrusion detection technologies. Software Engineering Institute,Carnegie Mellon University, Tech. Rep. : CMU/SE1-99-TR028, 2000.
  • 2S. Staniford, J. A, Hoaglond, J, M, McAlerney. Practical automated detection of stealthy portscans, The 7th ACM Conf.Computer and Communications Security, Athens, Greece, 2000.
  • 3Fyodor. The art of port scanning, http://www.insecure.org/nmap/nmap-doe. html, 2004
  • 4L. Heberlein, G.Dias, K. Levitt, et al. A network security monitor. IEEE Symposium on Research in Security and Privacy,Oakland, CA, 1990.
  • 5Steven Cheung, Rick Crawford, Mark Dilger, et al, The design of GrIDS: A graph-based intrusion detection system. U. C,. Davis Computer Science Department, Tech. Rep. : CSE-99-2, 1999.
  • 6Martin Roesch. snort, http://www.snort.org/, 2004.
  • 7P. Porras, A. Valdes. Live traffic analysis of TCP/IP gateways.1998 lnternet Society Symposium on Network and Distributed System Security, San Diego, 1998.

同被引文献59

引证文献9

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部