Residential Collegefalse
Status已發表Published
Experimental research on DFA-Based MLML IDS security evaluation
Hongbin Wang1; Zhiyi Fang1; Simon Fong2; Yain-Whar Si2; Liyang Liu2
2010-12-01
Conference Name2011 Eighth International Conference on Information Technology: New Generations
Source PublicationProceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011
Pages370-375
Conference Date11-13 April 2011
Conference PlaceLas Vegas, NV, USA
Abstract

Many manufacturers and researchers have established various Intrusion Detection System (IDS) evaluation standards, most of which involve tests of IDS functions but neglect evaluation of IDS security. On the basis of IDS security evaluation, this paper describes segmented and multi-level mixed evaluation methods, classifies intrusions by type of TCP/IP, and illustrates the evaluation process by means of the Deterministic Finite Automaton (DFA) in fragmentation, making the test process more straightforward and vivid. Credibility levels are assigned to measures which are taken to make products meet basic functional requirements, thus dividing the evaluation process into three levels. © 2011 IEEE.

KeywordDfa Ids Multi-layer Evaluation Multi-level Evaluation Security
DOI10.1109/ITNG.2011.72
URLView the original
Language英語English
Scopus ID2-s2.0-80051503357
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
Affiliation1.College of Computer Science and Technology, Jilin University
2.Faculty of Science and Technology University of Macau
Recommended Citation
GB/T 7714
Hongbin Wang,Zhiyi Fang,Simon Fong,et al. Experimental research on DFA-Based MLML IDS security evaluation[C], 2010, 370-375.
APA Hongbin Wang., Zhiyi Fang., Simon Fong., Yain-Whar Si., & Liyang Liu (2010). Experimental research on DFA-Based MLML IDS security evaluation. Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, 370-375.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Hongbin Wang]'s Articles
[Zhiyi Fang]'s Articles
[Simon Fong]'s Articles
Baidu academic
Similar articles in Baidu academic
[Hongbin Wang]'s Articles
[Zhiyi Fang]'s Articles
[Simon Fong]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Hongbin Wang]'s Articles
[Zhiyi Fang]'s Articles
[Simon Fong]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.