Full metadata record
DC FieldValueLanguage
dc.contributor.author王銓祺en_US
dc.contributor.authorChan Chi Wangen_US
dc.contributor.author謝續平en_US
dc.contributor.authorShieh Shiuh Pyngen_US
dc.date.accessioned2014-12-12T02:10:31Z-
dc.date.available2014-12-12T02:10:31Z-
dc.date.issued1992en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#NT810392067en_US
dc.identifier.urihttp://hdl.handle.net/11536/56801-
dc.description.abstract本論文提出一個採用分散式處理(distributed processing)的模式導向( pattern oriented)侵害行為偵測模式(intrusion detection model),用 來分析電腦網路中的資訊(information)和權利(privilege)的傳遞以偵測 利用系統運作弱點(operational security problem)的直接或間接侵害行 為.本模式採用分散式的資料處理(data processing)技巧(technique),將 可以加快處理速度,並且可以降低分析過程中必須的資料傳輸量,減少對系 統所造成的負荷.在隱密通道的偵測方面,我們亦提出估計隱密通道最大使 用頻寬(co- vert channel bandwidth estimation)的方法,對於有限狀態 通道(finite state channel)和無窮狀態通道(infinite state channel) 的處理均有詳細的探討. In this thesis, we present a distributed pattern-oriented, intrusion-detection model which can track data and privilege flows in computer networks. It has the advantage of detecting context-dependent intrusions such as those caused by inadvertent execution of foreign programs containing viruses or Trojan Horse, and those caused by network message insertion by wire-tapping. Our model is the only model to date that detect intrusions in computer networks by using a distributed analysis technique. It can enhance the analysis speed and avoid the heavy network traffic load. One of the difficulties of detecting context-dependent intusion patterns is the use of covert storage channels. Some of the covert channels can be modeled as finite-state graphs while others cannot. In this thesis, we will present methods to determine and estimate the maximum bandwidths of both finite- state channels, and give the problems and basic rules for their measurement.zh_TW
dc.language.isoen_USen_US
dc.subject分散式處理;侵害行為偵測;系統運作弱點;間接侵害行為;隱密通道zh_TW
dc.subjectDistributedProcessing;IntrusionDetection; OperationalSecurityProblem;IndirectIntrusion;ConvertChannelen_US
dc.title一個採用分散式處理的侵害行為偵測模式及其應用zh_TW
dc.titleA Distributed Intrusion-Detection Method and Its Applicationsen_US
dc.typeThesisen_US
dc.contributor.department資訊科學與工程研究所zh_TW
Appears in Collections:Thesis