• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Zhihong, Wang Bailing, Zhang Weizhe, Ye Jianwei, and Zhang Hongli. Network Intrusion Detection Model Based on Context Verification[J]. Journal of Computer Research and Development, 2013, 50(3): 498-508.
Citation: Tian Zhihong, Wang Bailing, Zhang Weizhe, Ye Jianwei, and Zhang Hongli. Network Intrusion Detection Model Based on Context Verification[J]. Journal of Computer Research and Development, 2013, 50(3): 498-508.

Network Intrusion Detection Model Based on Context Verification

More Information
  • Published Date: March 14, 2013
  • Network intrusion-detection systems (NIDSs) are considered an effective second line of defense against network-based attacks directed to computer systems. Because of the increasing severity and likelihood of such attacks, the NIDSs are employed in almost all large-scale IT infrastructures. The Achille’s heel of NIDSs lies in the large number of false positives. However, today’s NIDSs often try to detect not only intrusions, but also successful intrusion attempts. This is because it can be difficult for an NIDS to determine the result of an intrusion attempt. A popular approach of verifying intrusion attempt results is to let an IDS be aware of the environment and configuration of the systems under attack. Based on the above idea, in order to eliminate the negative influence on IDS stability caused by non-relevant alerts, a network intrusion detection model is designed based on context verification. With the combination of environment context, weakness context, feedback context and anomaly context, our model constructs an effective, stable, integrated, and extendable non-relevant alerts processing platform which focuses on context verification and integrates multiple security techniques. It achieves the automatic validation of alarming and automatic judgments of their effectiveness to eliminate the non-relevant alerts, and thus it establishes the reliable foundation for alerts association.
  • Related Articles

    [1]Chen Haoling, Yu Huiqun, Fan Guisheng, Li Mingchen, Huang Zijie. Class Summarization Generation Technology Based on Hierarchical Representation and Context Enhancement[J]. Journal of Computer Research and Development, 2024, 61(2): 307-323. DOI: 10.7544/issn1000-1239.202330730
    [2]Xiao Jinsheng, Zhao Tao, Zhou Jian, Le Qiuping, Yang Liheng. Small Target Detection Network Based on Context Augmentation and Feature Refinement[J]. Journal of Computer Research and Development, 2023, 60(2): 465-474. DOI: 10.7544/issn1000-1239.202110956
    [3]Yu Chang, Wang Yawen, Lin Huan, Gong Yunzhan. Fault Detection Context Based Equivalent Mutant Identification Algorithm[J]. Journal of Computer Research and Development, 2021, 58(1): 83-97. DOI: 10.7544/issn1000-1239.2021.20190817
    [4]Lin Xin, Tian Xin, Ji Yi, Xu Yunlong, Liu Chunping. Scene Graph Generation Based on Shuffle Residual Context Information[J]. Journal of Computer Research and Development, 2019, 56(8): 1721-1730. DOI: 10.7544/issn1000-1239.2019.20190329
    [5]Yang Qian, Luo Juan, Liu Chang. Context Based Service Recommendation Middleware in VANET[J]. Journal of Computer Research and Development, 2017, 54(9): 1992-2000. DOI: 10.7544/issn1000-1239.2017.20160640
    [6]Chen Xiaokang, Xu Chang, Jiang Lei. Hybrid-Fixing: Toward Sound Fixing of Context Inconsistency[J]. Journal of Computer Research and Development, 2015, 52(6): 1443-1451. DOI: 10.7544/issn1000-1239.2015.20131904
    [7]Li Weijiang, Zhao Tiejun, Wang Xiangang. Context-Sensitive Query Expansion[J]. Journal of Computer Research and Development, 2010, 47(2): 300-304.
    [8]Lin Xin, Li Shanping, Yang Zhaohui, Xu Jian. A Reasoning-Oriented Context Replacement Algorithm in Pervasive Computing[J]. Journal of Computer Research and Development, 2009, 46(4): 549-557.
    [9]Tang Lei, Huai Xiaoyong, Li Mingshu. An Approach to Dynamic Service Composition Based on Context Negotiation[J]. Journal of Computer Research and Development, 2008, 45(11): 1902-1910.
    [10]Li Rui and Li Renfa. A Survey of Context-Aware Computing and Its System Infrastructure[J]. Journal of Computer Research and Development, 2007, 44(2): 269-276.

Catalog

    Article views (1026) PDF downloads (791) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return