期刊文献+

基于消息安全的DIDS研究

Research on Distributed Intrusion Detection System Based on Message Secure Exchange
下载PDF
导出
摘要 将密码学运用到入侵检测系统中,实现入侵检测系统的安全;将agent技术和点到点技术应用到研究中,实现分布式入侵检测系统。给出系统的设计与实现方法。对系统的安全性及性能进行了分析。 Cryptography is used in intrusion detection system to improve the security of an intrusion detection system; a new architecture and model of DIDS based on agent and peer-to-peer technology are described. The design and implementation of DIDS are also discussed. Finally, the security of the system and its performance are analyzed.
出处 《青岛大学学报(自然科学版)》 CAS 2004年第2期76-81,共6页 Journal of Qingdao University(Natural Science Edition)
关键词 入侵检测 密码 消息安全 AGENT 点到点 分布式 intrusion detection cipher message security agent peer-to-peer distribution
  • 相关文献

参考文献15

  • 1Vern Paxson Bro A system for Detecting Network Intruders in Real Time [C]. In Proceedings of the 7th Symposium on USENIX Security, 1998.
  • 2Julia Allen, Alan Christie, William Fithen, et al. State of the Practice of Intrusion Detection Technologies [R]. Technical Report 99tr028, Carnegie Mellon-Software Engineering Institute, 2000.
  • 3Wenke Lee Salvatore Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems [J]. ACM Transactions on Information and System Security, 2000, 3(4):227-261.
  • 4S. Staniford-Chen, Cheung S, Crawford R, et al GrIDS-A Graph Based Intrusion Detection System for Large Networks [C]. In Proceedings of the 19th National Information System Security Conference, 1996.
  • 5Jai Sundar Balasubramaniyan, Jose Omar Farcia-Fernandez, David Isacoff, et al An Architecture for Intrusion Detection using Autonomous Agents [R]. Technical report, Cerias Purdue, November 2001.
  • 6Eugene H Spafford, Diego Zamboni. Intrusion detection using autonomous agents [J]. Elsevier Computer Networks, 2000, 34:547-570
  • 7Phillip A Porras, Peter G, Neumann. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances [C]. In 1997 National Information Systems Security Conference, oct, 1997.
  • 8Peter G Neumann, Phillip A Porras. Experience with Emerald to Date [C]. In First USENIX Workshop on Intrusion Detection and Network Monitoring, April, 1999.
  • 9Cliff Kahn, Dan Bolinger, Don Schackenberg. Communication in the Common Intrusion Detection Framework v0.7 [onL], June 1998. available at: http: //www.isi. edu/brian/cidf/drafts/communication. txt.
  • 10Curry D, Debar H.Intrusion detection message exchange format data model and extensible markup language (xml) document type definition. draft-ietf-idwg-idmef-xml-06. txt, December 2001. expires June 27, 2002.

二级参考文献7

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997

共引文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部