基于自主代理的入侵检测
被引量:2
Intrusion Detection Based on Autonomous Agents
摘要
文中分析了一般入侵检测系统在可配置性、可伸缩性和效率等方面的弱点,描述了自主代理技术在入侵检测的数据采集和数据分析方面的优势,介绍了一种基于自主代理的入侵检测方法及其实现部件。
出处
《计算机应用》
CSCD
北大核心
2002年第2期40-42,共3页
journal of Computer Applications
参考文献12
-
1[1]S.M.Bellovin.Security problems in the TCP/IP protocol suite[J].Computer Communication Review, 1989,19(2):32-48.
-
2[2]R.Heady, G.Luger, A.Maccabe, et al.The architecture of a network level intrusion detection system[R].Technical Report, University of New Mexico, Department of Computer Science, August 1990.
-
3[3]B.Mukherjee, Todd L.Heberlein, Karl N.Levitt.Network Intrusion Detection[J].IEEE Network,,May/June 1994,8(3): 26-41.
-
4[4]Phil Porras, Dan Schnackenberg, Stuart Staniford-Chen.The Common Intrusion Detection Framework Architecture[EB/OL].http://www.gidos.org.
-
5[5]Thomas H.Ptacek, Timothy N.Newsham.Insertion, evation, anddenial of service: Eluding network[R].Technical report, Secure Networks, Inc., January 1998.
-
6[6]S.Staniford-Chen, S.Cheung, R.Crawford, et al.GrIDS: A graph based intrusion detection system for large networks[C].In Proceedings of the 19th National Information Systems Security Conference, volume 1.National Institute of Standards and Technology, October 1996.361-370.
-
7[7]Gregory B.White, Eric A.Fisch, Udo W.Pooch.Cooperating securitymanagers: A peer-based intrusion detection system[J].IEEE Network, January/February 1996:20-30.
-
8[8]Mark Crosbie, Gene Spafford.Defending a Computer System usingAutonomous Agents[R].COAST Technical Report No.95-022,March 1994.
-
9[9]Mark Crosbie, Gene Spafford.Active Defense of a Computer Systemusing Autonomous Agents[R].COAST Technical Report No.95-008, February 1995.
-
10[10]Jeffrey M.Bradshaw.An Introduction to software agents[M].AAAiPress/The Mit Press, 1997.
同被引文献2
-
1Staniford-Chen S,Cheung S,Crawford R,Dilger M,Frank J,Hoagland J,Levitt K,Wee C,et.al.The design of grids:a graph based intrusion detection system for large networks.[R]Technical Reports.UC Davis,1999.
-
2翁莉萍,赵仲孟.基于轻量级Agent的入侵检测模型[J].计算机工程,2002,28(5):155-157. 被引量:2
-
1刘惠文,王红涛,何欣.网络入侵检测概述[J].网络安全技术与应用,2002(5):13-16. 被引量:5
-
2罗元,邹志强.一种新的分布式Java Agents环境[J].小型微型计算机系统,2000,21(11):1227-1230.
-
3马颖.基于Agents网络入侵检测系统的研究[J].计算机与现代化,2003(2):56-57. 被引量:1
-
4杨立.《大学计算机基础》课程教学的几点思考[J].运城学院学报,2007,25(2):87-88. 被引量:7
-
5阮乐中,穆斌.入侵检测系统的研究[J].合肥工业大学学报(自然科学版),2002,25(z1):938-941. 被引量:1
-
6宋庆雷,单洪.卫星网络中的拥塞控制算法分析[J].舰船电子工程,2007,27(2):130-133. 被引量:1
-
7康琼.关于计算机基础教学中的几点改进意见[J].信息与电脑(理论版),2012(1):209-209.
-
82016年影响化工行业发展的十大战略科技[J].塑料包装,2015,0(6):64-64.
-
9吴浪.浅析非软件行业人员自主开发的不良习惯及改进建议[J].电脑知识与技术,2016,0(2):102-103.
-
10Jing HAN,Ming LI,Lei GUO.SOFT CONTROL ON COLLECTIVE BEHAVIOR OF A GROUP OF AUTONOMOUS AGENTS BY A SHILL AGENT[J].Journal of Systems Science & Complexity,2006,19(1):54-62. 被引量:23