Advanced Search
Volume 26 Issue 10
Oct.  2004
Turn off MathJax
Article Contents
Wang Ru-chuan, Huang Liang-jun, Hu Tao, Sun Zhi-xin. The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology[J]. Journal of Electronics & Information Technology, 2004, 26(10): 1668-1674.
Citation: Wang Ru-chuan, Huang Liang-jun, Hu Tao, Sun Zhi-xin. The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology[J]. Journal of Electronics & Information Technology, 2004, 26(10): 1668-1674.

The Research and Implementation of Attack Simulation Platform for Testing Intrusion Detection System Based on Virtual Machine Technology

  • Received Date: 2003-05-26
  • Rev Recd Date: 2003-09-29
  • Publish Date: 2004-10-19
  • Attack simulation plays a key role in testing Intrusion Detection System(IDS). Prom the viewpoint of attack testing, an attack simulation platform is put forward for testing IDS based on virtual machine technology. First of all, the testing aims and contents of attack simulation are proposed. Then, the design and implementation of the attack simulation platform are presented in detail. Under the platform, that the authors build, three key issues in realization of the platform :the choice of testing datum, the classification of attack technology, and the attack testing zones and their compartmentalization are discussed in detail. Finally, the test results are given.
  • loading
  • Puketza N, et al.. A software platform for testing intrusion detection system. IEEE Software Magazine, 1997, 14(5): 43-51.[2]蔡忠闽,等.入侵检测系统评估环境的设计与实现.系统仿真学报,2002,14(3):377-380.[3]Eric Cole著,苏雷,等译.黑客-攻击透析与防范.北京:电子工业出版社,2002:152-165.[4]Miller I. Protection Against a Variant of the Tiny Fragment Attack, RFC3128 Singularis Ltd.2001.[5]张铭来,等.网络型入侵检测系统存在的漏洞及其对策研究.计算机工程,2002,28(1):172-174.[6]Nash D A, Ragsdale D J. Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. IEEE Trans. on Systems, Man and Cybernetics: Part A, 2001, SMC-A-31(4): 327-331.[7]Erbacher R F, Walker K L, Frincke D A. Intrusion and misuse detection in large-scale systems. IEEE Computer Graphics and Applications, 2002, 22(1): 38-47.[8]James Stanger,Patrick T Lane著,钟日红,等译.Linux黑客防范开放源代码安全指南.北京:机械工业出版社,2002:176-190.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2502) PDF downloads(1164) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return