Residential College | false |
Status | 已發表Published |
Experimental research on DFA-Based MLML IDS security evaluation | |
Hongbin Wang1; Zhiyi Fang1; Simon Fong2; Yain-Whar Si2; Liyang Liu2 | |
2010-12-01 | |
Conference Name | 2011 Eighth International Conference on Information Technology: New Generations |
Source Publication | Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011 |
Pages | 370-375 |
Conference Date | 11-13 April 2011 |
Conference Place | Las Vegas, NV, USA |
Abstract | Many manufacturers and researchers have established various Intrusion Detection System (IDS) evaluation standards, most of which involve tests of IDS functions but neglect evaluation of IDS security. On the basis of IDS security evaluation, this paper describes segmented and multi-level mixed evaluation methods, classifies intrusions by type of TCP/IP, and illustrates the evaluation process by means of the Deterministic Finite Automaton (DFA) in fragmentation, making the test process more straightforward and vivid. Credibility levels are assigned to measures which are taken to make products meet basic functional requirements, thus dividing the evaluation process into three levels. © 2011 IEEE. |
Keyword | Dfa Ids Multi-layer Evaluation Multi-level Evaluation Security |
DOI | 10.1109/ITNG.2011.72 |
URL | View the original |
Language | 英語English |
Scopus ID | 2-s2.0-80051503357 |
Fulltext Access | |
Citation statistics | |
Document Type | Conference paper |
Collection | DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE |
Affiliation | 1.College of Computer Science and Technology, Jilin University 2.Faculty of Science and Technology University of Macau |
Recommended Citation GB/T 7714 | Hongbin Wang,Zhiyi Fang,Simon Fong,et al. Experimental research on DFA-Based MLML IDS security evaluation[C], 2010, 370-375. |
APA | Hongbin Wang., Zhiyi Fang., Simon Fong., Yain-Whar Si., & Liyang Liu (2010). Experimental research on DFA-Based MLML IDS security evaluation. Proceedings - 2011 8th International Conference on Information Technology: New Generations, ITNG 2011, 370-375. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment