:::

詳目顯示

回上一頁
題名:網站入侵偵測系統之分析與研究
書刊名:資訊管理學報
作者:施東河黃于爵
作者(外文):Shih, Dong-herHwang, Yu-chei
出版日期:2003
卷期:9:2
頁次:頁183-214
主題關鍵詞:入侵偵測系統駭客類神經網路自組織映射圖網路Intrusion detection systemHackerNeural networkSelf-organizing mapSOM
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:0
  • 點閱點閱:21
網路安全對MIS資訊人員來說非常重要,然而技術人員的技術與知識越來越難跟上不斷出現的安全漏洞與攻擊手法。在日新月異的資訊安全問題中,如何及時找出網路安全的弱點,適時地、有效率的定期評估稽核自我網路安全狀況,成了當前企業與MIS資訊人員首要關切的議題。本文除廣泛搜集現有市面上所有的網站入侵行為與攻擊軟體外,並根據國內外入侵偵測系統的探討,提出綜合Network-based misuse model與Host-based anomaly model的WIDS入侵偵測系統。本研究採用額神經網路中的自組織映射圖網路架構,並試圖提出一套具有學習能力的WIDS網站入侵偵測系統,期望能解決日新月異不斷翻新的攻擊手法,使得系統得以自我學習保護,使駭客攻擊傷害能降到最小。經過實證,本研究之入侵偵測系統正確率高達86%以上。
Network security to MIS personnel is very important. However, the technique and knowledge of the technician is getting hard to catch up with more and more secure leak and attack skill. During the improving of information security, to find out the weakness of network security instantly is very important. Also, to efficiently and correctly estimate and examine one’s own security condition has become the first important theme for current enterprise and MIS personnel. Our research, adopt the neural network type of SOM (Self-Organizing Map) structure, and try to propose a self-learning WIDS (Web Intrusion Detection System) which have the learning ability to detect the invade of network system. Our expectation is to solve the continuously changed invading attack problems. Through our WIDS (Web Intrusion Detec­tion System), provided our system self-study ability so learn to protect system itself, also minimize hackers’ attack. After testing and verifying, our research of WIDS (Web Intrusion Detection System) can be successfully detected up to 86% correctness.
期刊論文
1.李駿偉、田筱榮、黃世昆(20020300)。入侵偵測分析方法評估與比較。資訊安全通訊,8(2),21-37。  延伸查詢new window
2.李勁頤、陳奕明(2002)。分散式入侵偵測系統研究現況介紹。資訊安全通訊,8(2),38-61。  延伸查詢new window
3.Mukherjee, B.、Heberlein, L. T.、Levitt, K. N.(1994)。Network Intrusion Detection。IEEE Network,8(3),26-41。  new window
4.Feiertag, R.、Rho, S.、Benzinger, L.、Wu, Stephon、Redmond, T.(2000)。Intrusion Detection inter-component adaptive negotiation。Computer Networks,34,605-621。  new window
5.Kohonen, T.、Kangas, J. A.、Laaksonen, J. T.(1990)。Variants of self-organizing maps。IEEE Transactions on Neural Networks,1(1),93-99。  new window
6.Lee, Susan C.、Heinbuch, D. V.(2001)。Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks。IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans,31(4),294-299。  new window
7.Ning, Peng、Jajodia, S.、Wang, Sean Xiaoyang(2001)。Abstraction-based Intrusion Detection in Distributed Environments。ACM Transactions on Information and System Security,4(4),407-452。  new window
8.Verwoerd, T.、Hunt, R.(2002)。Security architecture testing using IDS - A Case Study。Computer Communications,25(15),1402-1412。  new window
9.曾憲雄、林耀聰、林順傑(2001)。An Intrusion Detection Model Based Upon Intrusion Detection Markup Language。Journal of Information Science and Engineering,17(6),899-919。  new window
會議論文
1.Bauer, D. C.、Cannady, J.、Garcia, R. C.(2001)。Detecting anomalous behavior: Optimization of network traffic parameters via an evolution strategy。沒有紀錄。34-39。  new window
2.Bonifacio, J. M., Jr.、Cansian, A. M.(1998)。Neural Networks Applied in Intrusion Detection System。沒有紀錄。205-210。  new window
3.Helmer, G.、Wong, Johnny、Slagell, M.(2000)。A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System。沒有紀錄。  new window
4.Lee, Wenke、Numbalkar, R. A.、Yee, Kam K.(2000)。A data mining and CIDF based approach for detecting novel and distributed intrusions。沒有紀錄。  new window
5.Porras, P. A.、Neumann, P. G.(1997)。EMERALD: Event monitoring enabling responses to anomalous live disturbances。Baltimore, MD。353-365。  new window
6.Vigna, G.、Kemmerer, R.(1998)。NetSTAT: A Network-based Intrusion Detection Approach。Scottsdale, AZ。  new window
研究報告
1.Anderson, J. P.(1980)。Computer security threat monitoring and surveillance。Fort Washington, PA。  new window
2.Balasubramaniyan, J. S.、Garcia-Fernandez, J. O.、Isacoff, D.(1998)。An Architecture for Intrusion Detection using Autonomous Agents。沒有紀錄。  new window
3.Kemmerer, R. A.(1997)。NSTAT: A Model-based Real-time Network Intrusion Detection System。沒有紀錄。  new window
學位論文
1.丘偉權(2001)。以類神經網路建構入侵偵測系統,沒有紀錄。  延伸查詢new window
2.鄭有倫(2000)。具反偵察能力之分散式網路入侵偵測系統之設計與實現,沒有紀錄。  延伸查詢new window
圖書
1.Haykin, S.(1994)。Neural Networks: A Comprehensive Foundation。New York, NY:Macmillan College Publishing Company。  new window
2.洪蘭(1994)。天生嬰才:重新發現嬰兒的認知世界。天生嬰才:重新發現嬰兒的認知世界。沒有紀錄。  延伸查詢new window
3.蘇木春、張孝德(2000)。機器學習:類神經網路、模糊系統及基因演算法則。機器學習:類神經網路、模糊系統及基因演算法則。臺北。  延伸查詢new window
4.尤焙麟(2001)。駭客現形:網路安全之秘辛與解決方案。駭客現形:網路安全之秘辛與解決方案。臺北。  延伸查詢new window
其他
1.鮑友仲(2002)。再談「資料隱碼」攻擊,沒有紀錄。  延伸查詢new window
2.Bace, R.,Mell, P.。NIST Special Publication on Intrusion Detection Systems,沒有紀錄。  new window
3.(Computer Emergency Response Team,Coordination Center)(2001)。Internet Security Overview,沒有紀錄。  new window
4.(Computer Emergency Response Team,Coordination Center)(2002)。Statistics 1998-2002 Number of Incidents Reported,沒有紀錄。  new window
5.Graham, R.(2000)。FAQ: Network Intrusion Detection Systems,沒有紀錄。  new window
6.Michael, S.(2001)。Currently 92 Intrusion Detection Systems,沒有紀錄。  new window
7.SANS Resources(2002)。The Twenty Most Critical Internet Security Vulnerabilities Updated the Experts Consensus,沒有紀錄。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE