基于改进正则表达式规则分组的内网行为审计方案(3)
时间:2016-10-04 14:11 文章来源:http://www.lunwenbuluo.com 作者:俞艺涵等 点击次数:
参考文献:
[1]付钰,李洪成,吴晓平,等.基于大数据分析的APT攻击检测研究综述[J].通信学报,2015,36(11):1-14. (FU Y, LI H C, WU X P, et al. Detecting APT attacks: a survey from the perspective of big data analysis[J]. Journal on Communications, 2015, 36(11): 1-14.)
[2]CHEN P, DESMET L, HUYGENS C. A study on advanced persistent threats [C]// CMS 2014: Proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, LNCS 8735. Berlin: Springer-Verlag, 2014: 63-72.
[3]VIRVILIS N, GRITZALIS D A. The big four — what we did wrong in advanced persistent threat detection? [C]// ARES 13: Proceedings of the 2013 International Conference on Availability, Reliability and Security. Washington, DC: IEEE Computer Society, 2013: 248-254.
[4]YANG G, TIAN Z, DUAN W. The prevent of advanced persistent threat [J]. Journal of Chemical and Pharmaceutical Research, 2014, 6(7): 572-576.
http://jocpr.com/vol6-iss7-2014/JCPR-2014-6-7-572-576.pdf
[5]XIA Q. Log-based network security audit system research and design [J]. Advanced Materials Research, 2010, 129-131: 1426-1431.
http://xueshu.baidu.com/s?wd=paperuri%3A%28eda56fad603f84741f0a01c931f5ca56%29&filter=sc_long_sign&tn=SE_xueshusource_2kduw22v&sc_vurl=http%3A%2F%2Fwww.scientific.net%2FAMR.129-131.1426&ie=utf-8&sc_us=2224052801561460832
[6]L T, LIU P. Multi-Agent network security audit system based on information entropy [C]// SWS 2010: Proceedings of the 2010 IEEE 2nd Symposium on Web Society. Piscataway: IEEE, 2010: 367-371
[7]HUANG X, HUENG X, QUAN P. Research on firewall system for confidential network [J]. Advanced Materials Research, 2012, 434-440: 4279-4283.
http://xueshu.baidu.com/s?wd=paperuri%3A%28acbe264444054dcd5c37b8ed816b2b83%29&filter=sc_long_sign&tn=SE_xueshusource_2kduw22v&sc_vurl=http%3A%2F%2Fwww.scientific.net%2FAMR.433-440.4279&ie=utf-8&sc_us=2535543053782017323
[8]张树壮,罗浩,方滨兴.面向网络安全的正则表达式匹配技术[J].软件学报,2011,22(8):1838-1854. (ZHANG S Z, LUO H, FANG B X. Regular expressions matching for network security[J].Journal of Software, 2011, 22(8): 1838-1854.)
[9]邵妍.正则表达式匹配算法并行化技术研究[D].北京:北京邮电大学,2013:15-18. (SHAO Y. Parallelization technology of regular expression matching algorithms [D]. Beijing: Beijing University of Posts and Telecommunications, 2013: 15-18.)
[10]YU F, CHEN Z F, DIAO Y L, et al. Fast and memory-efficient regular expression matching for deep packet inspection [C]// ANCS 06: Proceedings of the 2006 IEEE/ACM Symposium on Architectures for Networking and Communications Systems. New York: ACM, 2006: 93-102.
[11]蔡良伟,程璐,李军,等.基于遗传算法的正则表达式规则分组优化[J].深圳大学学报(理工版),2015,32(3):281-289. (CAI L W, CHENG L, LI J, et al. Regular expression grouping optimization based on genetic algorithm[J]. Journal of Shenzhen University (Science and Engineering), 2015, 32(3): 281-289.)
[12]张运明.协议行为审计关键技术研究与实现[D].长沙:国防科学技术大学,2010: 11-13. (ZHANG Y M. The research and implementation of the key technology of protocol behavior audit [D]. Changsha: National University of Defense Technology, 2010: 11-13.)
[13]陈曙晖,苏金树.基于内容分析的协议识别研究[J].国防科技大学学报,2008,30(4):82-87. (CHEN S H, SU J S. Protocol identification research based on content analysis [J]. Journal of National University of Defense Technology, 2008, 30(4): 82-87.)
- 论文部落提供核心期刊、国家级期刊、省级期刊、SCI期刊和EI期刊等咨询服务。
- 论文部落拥有一支经验丰富、高端专业的编辑团队,可帮助您指导各领域学术文章,您只需提出详细的论文写作要求和相关资料。
-
- 论文投稿客服QQ:
2863358778、
2316118108
-
- 论文投稿电话:15380085870
-
- 论文投稿邮箱:lunwenbuluo@126.com