计算机与现代化

• 信息安全 • 上一篇    下一篇

#br# 基于多种检测技术融合的入侵检测系统

  

  1. 1.北京国电通网络技术有限公司,北京100070;2.上海交通大学电子信息与电气工程学院,上海200240;
    3.上海市信息安全综合管理技术研究重点实验室,上海200240;4.国网浙江省电力公司信息通信分公司,浙江杭州310007
  • 收稿日期:2015-11-03 出版日期:2016-05-24 发布日期:2016-05-25
  • 作者简介:郑生军(1977-),男,安徽怀宁人,北京国电通网络技术有限公司高级工程师,硕士,研究方向:电力系统信息安全; 夏业超(1991-),男,安徽六安人,上海交通大学电子信息与电气工程 学院和上海市信息安全综合管理技术研究重点实验室硕士研究生,研究方向:信息内容安全,网络安全; 李建华(1965-),男,博士生导师,研究方向;信息安全; 王莉,女,研究方向:电力系统信 息安全; 王红凯(1984-),男,浙江绍兴人,国网浙江省电力公司信息通信分公司高级工程师,硕士,研究方向:企业级网络,信息安全,信息系统关键技术。
  • 基金资助:
    国家电网科技项目(524681140009)

Intrusion Detection System Based on Integration of #br# Various Detection Technologies

  1. 1. Beijing GuoDianTong Network Technology Co. Ltd.〖KG-*3〗, Beijing 100070, China;
    2. School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China;
    3. Key Lab of Shanghai Information Security Integrated Management Research, Shanghai 200240, China;
    4. Information and Telecommunication Branch of State Grid Zhejiang Electric Power Company, Hangzhou 310007, China
  • Received:2015-11-03 Online:2016-05-24 Published:2016-05-25

摘要:

随着网络技术的不断发展,机构内网也日益受到各种已知或未知恶意程序的威胁,为了更加有效全面地检测出这些恶意程序,本文设计并实现一种基于深度检测技术、异常攻击检测技术、误用检
测技术相结合的入侵检测系统。该系统由深度协议分析、行为分析、特征匹配、智能协议识别、协议异常攻击检测、流量异常检测等技术融合而成一体化的入侵检测系统,并由数据采集模块、流量还原
分析模块、攻击检测模块、特征库模块和控制台实现恶意程序的检测流程。该系统克服了传统单一检测方法的不足,可有效检测如0day攻击、多态攻击、变形攻击等新一代威胁。

关键词: 深度检测, 异常攻击检测, 误用检测, 协议分析

Abstract:

With the continuous development of network technology, inhouse network security is also increasingly subject to various known and unknown malware threats. In order
to detect these malicious programs, we designed and implemented an intrusion detection system based on integration of the depth detection technology, anomaly detection
technology, misuse detection technology. This intrusion detection system uses depth protocol analysis, behavioral analysis, feature matching, intelligent protocol
identification, protocol anomaly attack detection, traffic anomaly detection and so on. And this intrusion detection system realizes malicious programs detection through data
acquisition module, data reorganization module, data analysis module, console module and features for system management module. The system overcomes the shortcomings of
traditional single detection schemes, and can detect new generation of threats such as 0day attacks, polymorphic attacks, distortion attacks effectively.

Key words: depth detection, intrusion detection, misuse detection, protocol analysis

中图分类号: