期刊文献+

基于移动Agent和蜜罐的入侵检测系统分析与设计 被引量:1

Analysis and design of intrusion detection system based on mobile agent and honeypot
下载PDF
导出
摘要 为了解决入侵检测系统花费巨大及在单机上占用主机大量系统资源的问题,提出了一种新型的基于Honeypot和MobileAgent的入侵检测系统AH-IDS,并根据MobileAgent能够在网络中自由移动等特点重点分析了系统的工作流程、主要部分的架构组成和AH-IDS中监视器组件的设计。通过两个简单的例子说明AH-IDS可以通过分析入侵攻击的特性来实现对简单攻击的检测,并通过对AH-IDS的性能的分析说明了AH-IDS的检测性能与其它的IDS相比有了提高。 In order to resolve the high IDS costs and huge system resource requirements in a terminal computer, A honeypot and mobile agent-nased intrusion detection system (AH-IDS) is proposed. According to t he characteristic which the mobile agent can freely move in the network, the work flow of the system is analyzed, the majority components is proposed, the design of the monitor is presented. AH-IDS can detect the simple attack by analyzing the invasive characteristics from two simple examples, and the detecting capabilities of the AH-IDS are enhanced by analyzing the capabilities of the AH-IDS.
机构地区 空军雷达学院
出处 《计算机工程与设计》 CSCD 北大核心 2006年第24期4786-4788,共3页 Computer Engineering and Design
关键词 入侵检测系统 蜜罐 移动AGENT 监视器 AH—IDS IDS honeypot, mobilc agcnt monitor AH-IDS
  • 相关文献

参考文献7

  • 1Yin Chunmei.Honeypot and scan detection in intursion detection system[C].Canada:IEEE CCECE,2004.1107-1110.
  • 2Xiong Jia-jun,Zhang Jing.A kind of multilayer intrusion detection system using mobile agent[C].Xi'an:Proceedings of the Second International Conference on Machine Learning and Cybernetics,2003.1951-1955.
  • 3张文科,张文政,陈雷霆.蜜罐技术在防御分布式拒绝服务攻击中的应用[J].通信技术,2003(5):95-96. 被引量:7
  • 4Lance Spitzner.Honeypots:Tracking hackers[M].北京:清华大学出版社,2004.
  • 5Simon Y Foo,Michael Arradondo.Mobile agents for computer intrusion detetion[C].Atlanta:IEEE Proceedings of the 36th Southeastern Symposium on System Theory,2004.517-521.
  • 6杨奕.基于入侵诱骗技术的网络安全研究与实现[J].计算机应用研究,2004,21(3):230-232. 被引量:17
  • 7Zhong Shao-chun,Song Qing-feng.A safe mobile agent system for distributed intrusion detection[C].Xi'an:Proceedings of the Second International Conference on Machine Learning and Cybernetics,2003.2009-2014.

二级参考文献4

共引文献22

同被引文献9

  • 1曹登元,周莲英,刘芳.针对应用层未知攻击的蜜罐系统框架的研究与实现[J].计算机工程与设计,2006,27(5):765-767. 被引量:4
  • 2郑君杰,肖军模,刘志华,王晓蕾,王宏涛.基于Honeypot技术的网络入侵检测系统[J].电子科技大学学报,2007,36(2):257-259. 被引量:12
  • 3Honcynet Project.Know your enemy[EB8OL].http://www.honeynet.org/papers/honeynet/index.html.
  • 4Chunming Rong.Geng Yang.Honeypots in Blackhat mode and its implications[C].USA:Proceedings of the Fourth International Conference on Parallel and Distributed Computing,Applications and Technologies,2003:185-188.
  • 5Iyad Kuwatly,Malek Sraj,Zaid AI Masri,et al.A dynamic Honeypot design for intrusion detection[C].USA:Proceedings of the IEEE/ACS ICPS,2004:95-104.
  • 6Maximillian Domseif,Thorsten Holz.Christian N Klein.NoSEBrEaK-Attacking Honeynets[C].USA:Proceeding of IEEE Workshop on Information Assurance and Security,2004:123-129.
  • 7Laurent Oudot,Thorsten Holz.Debating Honeypots:Network issues[EB/OL].http://www.securityfocus.com/infocus/1805.
  • 8IEEE standards[S].http://standards.ieee.org/regauth/oui/oui.txt.
  • 9Neil C Rowe,Binh T Duong,John Custy E.Fake Honeypots:A defensive tactic for cyberspace[C].USA:Proceedings of Workshop on Information Assurance,IEEE,2006:223-230.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部