基于虛擬機(jī)技術(shù)的入侵檢測系統(tǒng)攻擊仿真平臺(tái)的研究和實(shí)現(xiàn)
The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology
-
摘要: 攻擊仿真平臺(tái)是入侵檢測系統(tǒng)(Intrusion Detectoin System,IDS)測試平臺(tái)的核心組成部分。該文從攻擊測試的角度,提出了一種基于虛擬機(jī)技術(shù)的IDS攻擊仿真平臺(tái)。首先介紹攻擊仿真的測試目標(biāo)和內(nèi)容,并提出了攻擊仿真系統(tǒng)和仿真平臺(tái)的設(shè)計(jì)和實(shí)現(xiàn)的詳細(xì)方案;同時(shí),在此基礎(chǔ)上,對該平臺(tái)的設(shè)計(jì)和實(shí)現(xiàn)的3個(gè)關(guān)鍵技術(shù):測試數(shù)據(jù)的選擇、攻擊技術(shù)的分類研究、攻擊測試域及其劃分等進(jìn)行了進(jìn)一步的分析,最后給出并分析了實(shí)驗(yàn)測試結(jié)果。
-
關(guān)鍵詞:
- 入侵檢測系統(tǒng);仿真平臺(tái);虛擬機(jī);攻擊測試
Abstract: Attack simulation plays a key role in testing Intrusion Detection System(IDS). Prom the viewpoint of attack testing, an attack simulation platform is put forward for testing IDS based on virtual machine technology. First of all, the testing aims and contents of attack simulation are proposed. Then, the design and implementation of the attack simulation platform are presented in detail. Under the platform, that the authors build, three key issues in realization of the platform :the choice of testing datum, the classification of attack technology, and the attack testing zones and their compartmentalization are discussed in detail. Finally, the test results are given. -
Puketza N, et al.. A software platform for testing intrusion detection system. IEEE Software Magazine, 1997, 14(5): 43-51.[2]蔡忠閩,等.入侵檢測系統(tǒng)評估環(huán)境的設(shè)計(jì)與實(shí)現(xiàn).系統(tǒng)仿真學(xué)報(bào),2002,14(3):377-380.[3]Eric Cole著,蘇雷,等譯.黑客-攻擊透析與防范.北京:電子工業(yè)出版社,2002:152-165.[4]Miller I. Protection Against a Variant of the Tiny Fragment Attack, RFC3128 Singularis Ltd.2001.[5]張銘來,等.網(wǎng)絡(luò)型入侵檢測系統(tǒng)存在的漏洞及其對策研究.計(jì)算機(jī)工程,2002,28(1):172-174.[6]Nash D A, Ragsdale D J. Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. IEEE Trans. on Systems, Man and Cybernetics: Part A, 2001, SMC-A-31(4): 327-331.[7]Erbacher R F, Walker K L, Frincke D A. Intrusion and misuse detection in large-scale systems. IEEE Computer Graphics and Applications, 2002, 22(1): 38-47.[8]James Stanger,Patrick T Lane著,鐘日紅,等譯.Linux黑客防范開放源代碼安全指南.北京:機(jī)械工業(yè)出版社,2002:176-190. -
計(jì)量
- 文章訪問數(shù): 2558
- HTML全文瀏覽量: 136
- PDF下載量: 1166
- 被引次數(shù): 0