Abstract: After introducing present intrusion deception technology and analyzing its shortages, a new intrusion detection model was proposed. It worked with intrusion detection technology. Deception happened only after the intrusion actions were detected. In this way, the system's security is enhanced.
黄璐, 于红. 结合IDS的网络入侵诱骗模型的研究[J]. 大连海洋大学学报, 2007, 22(4): 284-288.
HUANG Lu, YU Hong. Research on an intrusion deception model based on IDS. Journal of Dalian Ocean University, 2007, 22(4): 284-288.