Wang Ru-chuan, Huang Liang-jun, Hu Tao, Sun Zhi-xin. The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology[J]. Journal of Electronics & Information Technology, 2004, 26(10): 1668-1674.
Citation:
Wang Ru-chuan, Huang Liang-jun, Hu Tao, Sun Zhi-xin. The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology[J]. Journal of Electronics & Information Technology, 2004, 26(10): 1668-1674.
Wang Ru-chuan, Huang Liang-jun, Hu Tao, Sun Zhi-xin. The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology[J]. Journal of Electronics & Information Technology, 2004, 26(10): 1668-1674.
Citation:
Wang Ru-chuan, Huang Liang-jun, Hu Tao, Sun Zhi-xin. The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology[J]. Journal of Electronics & Information Technology, 2004, 26(10): 1668-1674.
Attack simulation plays a key role in testing Intrusion Detection System(IDS). Prom the viewpoint of attack testing, an attack simulation platform is put forward for testing IDS based on virtual machine technology. First of all, the testing aims and contents of attack simulation are proposed. Then, the design and implementation of the attack simulation platform are presented in detail. Under the platform, that the authors build, three key issues in realization of the platform :the choice of testing datum, the classification of attack technology, and the attack testing zones and their compartmentalization are discussed in detail. Finally, the test results are given.
Puketza N, et al.. A software platform for testing intrusion detection system. IEEE Software Magazine, 1997, 14(5): 43-51.[2]蔡忠闽,等.入侵检测系统评估环境的设计与实现.系统仿真学报,2002,14(3):377-380.[3]Eric Cole著,苏雷,等译.黑客-攻击透析与防范.北京:电子工业出版社,2002:152-165.[4]Miller I. Protection Against a Variant of the Tiny Fragment Attack, RFC3128 Singularis Ltd.2001.[5]张铭来,等.网络型入侵检测系统存在的漏洞及其对策研究.计算机工程,2002,28(1):172-174.[6]Nash D A, Ragsdale D J. Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. IEEE Trans. on Systems, Man and Cybernetics: Part A, 2001, SMC-A-31(4): 327-331.[7]Erbacher R F, Walker K L, Frincke D A. Intrusion and misuse detection in large-scale systems. IEEE Computer Graphics and Applications, 2002, 22(1): 38-47.[8]James Stanger,Patrick T Lane著,钟日红,等译.Linux黑客防范开放源代码安全指南.北京:机械工业出版社,2002:176-190.