完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | 王銓祺 | en_US |
dc.contributor.author | Chan Chi Wang | en_US |
dc.contributor.author | 謝續平 | en_US |
dc.contributor.author | Shieh Shiuh Pyng | en_US |
dc.date.accessioned | 2014-12-12T02:10:31Z | - |
dc.date.available | 2014-12-12T02:10:31Z | - |
dc.date.issued | 1992 | en_US |
dc.identifier.uri | http://140.113.39.130/cdrfb3/record/nctu/#NT810392067 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/56801 | - |
dc.description.abstract | 本論文提出一個採用分散式處理(distributed processing)的模式導向( pattern oriented)侵害行為偵測模式(intrusion detection model),用 來分析電腦網路中的資訊(information)和權利(privilege)的傳遞以偵測 利用系統運作弱點(operational security problem)的直接或間接侵害行 為.本模式採用分散式的資料處理(data processing)技巧(technique),將 可以加快處理速度,並且可以降低分析過程中必須的資料傳輸量,減少對系 統所造成的負荷.在隱密通道的偵測方面,我們亦提出估計隱密通道最大使 用頻寬(co- vert channel bandwidth estimation)的方法,對於有限狀態 通道(finite state channel)和無窮狀態通道(infinite state channel) 的處理均有詳細的探討. In this thesis, we present a distributed pattern-oriented, intrusion-detection model which can track data and privilege flows in computer networks. It has the advantage of detecting context-dependent intrusions such as those caused by inadvertent execution of foreign programs containing viruses or Trojan Horse, and those caused by network message insertion by wire-tapping. Our model is the only model to date that detect intrusions in computer networks by using a distributed analysis technique. It can enhance the analysis speed and avoid the heavy network traffic load. One of the difficulties of detecting context-dependent intusion patterns is the use of covert storage channels. Some of the covert channels can be modeled as finite-state graphs while others cannot. In this thesis, we will present methods to determine and estimate the maximum bandwidths of both finite- state channels, and give the problems and basic rules for their measurement. | zh_TW |
dc.language.iso | en_US | en_US |
dc.subject | 分散式處理;侵害行為偵測;系統運作弱點;間接侵害行為;隱密通道 | zh_TW |
dc.subject | DistributedProcessing;IntrusionDetection; OperationalSecurityProblem;IndirectIntrusion;ConvertChannel | en_US |
dc.title | 一個採用分散式處理的侵害行為偵測模式及其應用 | zh_TW |
dc.title | A Distributed Intrusion-Detection Method and Its Applications | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | 資訊科學與工程研究所 | zh_TW |
顯示於類別: | 畢業論文 |