Status已發表Published
Experimental Research on DFA-Based MLML IDS Security Evalution
Wang, H.; Fang, Z.; Fong, S.; Si, Y. W.; Liu, L.
2011-04-01
Source PublicationProceedings of the 2011 Eight International Conference on Information Technology: New Generations
Pages370-375
Publication PlaceUSA
PublisherIEEE Computer Society
AbstractMany manufacturers and researchers have established various Intrusion Detection System (IDS) evaluation standards, most of which involve tests of IDS functions but neglect evaluation of IDS security. On the basis of IDS security evaluation, this paper describes segmented and multi-level mixed evaluation methods, classifies intrusions by type of TCP/IP, and illustrates the evaluation process by means of the Deterministic Finite Automaton (DFA) in fragmentation, making the test process more straightforward and vivid. Credibility levels are assigned to measures which are taken to make products meet basic functional requirements, thus dividing the evaluation process into three levels.
KeywordIDS Multi-level evaluation Multi-layer evaluation DFA security
URLView the original
Language英語English
The Source to ArticlePB_Publication
PUB ID7065
Document TypeConference paper
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
Corresponding AuthorFong, S.
Recommended Citation
GB/T 7714
Wang, H.,Fang, Z.,Fong, S.,et al. Experimental Research on DFA-Based MLML IDS Security Evalution[C], USA:IEEE Computer Society, 2011, 370-375.
APA Wang, H.., Fang, Z.., Fong, S.., Si, Y. W.., & Liu, L. (2011). Experimental Research on DFA-Based MLML IDS Security Evalution. Proceedings of the 2011 Eight International Conference on Information Technology: New Generations, 370-375.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Wang, H.]'s Articles
[Fang, Z.]'s Articles
[Fong, S.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Wang, H.]'s Articles
[Fang, Z.]'s Articles
[Fong, S.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Wang, H.]'s Articles
[Fang, Z.]'s Articles
[Fong, S.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.