期刊文献+

基于移动Agent的分布式入侵检测模型

A Distributed Intrusion Detection Model Based on Mobile Agent
下载PDF
导出
摘要 首先剖析了目前分布式网络入侵检测所存在的问题以及待解决的技术难点,利用Agent构造了一种新颖的分级检测入侵的层次模型,增强了入侵检测系统自身的安全性和对分布式攻击的协同检测能力,有效降低了网络的通信负荷。该模型具有知识进化功能,能够根据环境的变化不断调整自己,具有很强的健壮性和良好的可伸缩性。 The technical problems and obstacles of distributed intrusion detection are analyzed. A novel hierarchy model of multi level detection intrusion is developed to enhance the security and collaborative detection capability of the model. Communication load is reduced effectively and the real time performance of intrusion detection is enhanced.And it can evolve and adjust itself dynamically to adapt to the environmental change. The model is robust and scalable.
出处 《计算机应用研究》 CSCD 北大核心 2005年第4期119-121,145,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2002AA142020)
关键词 移动代理 入侵检测 信息安全 Mobile Agent Intrusion Detection Information Security
  • 相关文献

参考文献4

二级参考文献21

  • 1S R Snapp, S E Smaha, D M Teal et al. The DIDS (distributed intrusion detection system) prototype. In: USENIX Association.Proc of the Summer 1992 USENIX Conf. Berkeley, CA, USA:USENIX Association, 1992. 227--233.
  • 2S Staniford-Chen, S Cheung, R Crawford et al. GrlDS---A graph based intrusion detection system for large networks. The 19th National Information Systems Security Conference (NISSC),Baltimore, MD, USA, 1996. 1:361-370.
  • 3J S Balasubramaniyan, J O Garcia-Fernandez, D Lsaeoff et al.Architecture for intrusion detection using autonomous agents.COAST Laboratory, Purdue University, COAST Tech Rep: 98-05, 1998. http://www. cerias. purdue.edu/homes/aafid/docs/tr9805, pdf.
  • 4P A Porras, P G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. The 20th National Information Systems Security Conf(NISSC), Baltimore,MD, USA, 1997.353-365.
  • 5J Pickel, R Danyliw. Enabling automated detection of security events that affect multiple administrative domains.Information Networking Institute, Carnegie Mellon University, Pittsburgh,PA, USA, 2000. http://www. incident.org/thesis/bookl. html.
  • 6C Krugel, T Toth. Distributed pattern detection for intrusion detection. The Network and Distributed System Security Symposium Conf, San Diego, CA, USA, 2002.
  • 7S Staniford-Chen, B Tung, D Schnackenberg. The common intrusion detection framework (CIDF) . The 1st Information Survivability Workshop, Orlando, FL, USA, 1998.
  • 8T Bass. Intrusion detection systems and multisensor data fusion.Communications of the ACM, 2000, 43(4) : 99--105.
  • 9Intrusion Detection Working Group. The Intrusion Detection Exchange Protocol (IDXP) . 2002. http://www.ietf.org/internet-drafts/draft-ietf-idwg-beep-idxp-04, txt.
  • 10Intrusion Detection Working Group. Intrusion detection message exchange format data model and extensible markup language(XML) document type definition. 2001. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-06. txt.

共引文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部