Status | 已發表Published |
Experimental Research on DFA-Based MLML IDS Security Evalution | |
Wang, H.; Fang, Z.; Fong, S.; Si, Y. W.; Liu, L. | |
2011-04-01 | |
Source Publication | Proceedings of the 2011 Eight International Conference on Information Technology: New Generations |
Pages | 370-375 |
Publication Place | USA |
Publisher | IEEE Computer Society |
Abstract | Many manufacturers and researchers have established various Intrusion Detection System (IDS) evaluation standards, most of which involve tests of IDS functions but neglect evaluation of IDS security. On the basis of IDS security evaluation, this paper describes segmented and multi-level mixed evaluation methods, classifies intrusions by type of TCP/IP, and illustrates the evaluation process by means of the Deterministic Finite Automaton (DFA) in fragmentation, making the test process more straightforward and vivid. Credibility levels are assigned to measures which are taken to make products meet basic functional requirements, thus dividing the evaluation process into three levels. |
Keyword | IDS Multi-level evaluation Multi-layer evaluation DFA security |
URL | View the original |
Language | 英語English |
The Source to Article | PB_Publication |
PUB ID | 7065 |
Document Type | Conference paper |
Collection | DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE |
Corresponding Author | Fong, S. |
Recommended Citation GB/T 7714 | Wang, H.,Fang, Z.,Fong, S.,et al. Experimental Research on DFA-Based MLML IDS Security Evalution[C], USA:IEEE Computer Society, 2011, 370-375. |
APA | Wang, H.., Fang, Z.., Fong, S.., Si, Y. W.., & Liu, L. (2011). Experimental Research on DFA-Based MLML IDS Security Evalution. Proceedings of the 2011 Eight International Conference on Information Technology: New Generations, 370-375. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment