期刊文献+

基于自主代理的入侵检测 被引量:2

Intrusion Detection Based on Autonomous Agents
下载PDF
导出
摘要 文中分析了一般入侵检测系统在可配置性、可伸缩性和效率等方面的弱点,描述了自主代理技术在入侵检测的数据采集和数据分析方面的优势,介绍了一种基于自主代理的入侵检测方法及其实现部件。
出处 《计算机应用》 CSCD 北大核心 2002年第2期40-42,共3页 journal of Computer Applications
  • 引文网络
  • 相关文献

参考文献12

  • 1[1]S.M.Bellovin.Security problems in the TCP/IP protocol suite[J].Computer Communication Review, 1989,19(2):32-48.
  • 2[2]R.Heady, G.Luger, A.Maccabe, et al.The architecture of a network level intrusion detection system[R].Technical Report, University of New Mexico, Department of Computer Science, August 1990.
  • 3[3]B.Mukherjee, Todd L.Heberlein, Karl N.Levitt.Network Intrusion Detection[J].IEEE Network,,May/June 1994,8(3): 26-41.
  • 4[4]Phil Porras, Dan Schnackenberg, Stuart Staniford-Chen.The Common Intrusion Detection Framework Architecture[EB/OL].http://www.gidos.org.
  • 5[5]Thomas H.Ptacek, Timothy N.Newsham.Insertion, evation, anddenial of service: Eluding network[R].Technical report, Secure Networks, Inc., January 1998.
  • 6[6]S.Staniford-Chen, S.Cheung, R.Crawford, et al.GrIDS: A graph based intrusion detection system for large networks[C].In Proceedings of the 19th National Information Systems Security Conference, volume 1.National Institute of Standards and Technology, October 1996.361-370.
  • 7[7]Gregory B.White, Eric A.Fisch, Udo W.Pooch.Cooperating securitymanagers: A peer-based intrusion detection system[J].IEEE Network, January/February 1996:20-30.
  • 8[8]Mark Crosbie, Gene Spafford.Defending a Computer System usingAutonomous Agents[R].COAST Technical Report No.95-022,March 1994.
  • 9[9]Mark Crosbie, Gene Spafford.Active Defense of a Computer Systemusing Autonomous Agents[R].COAST Technical Report No.95-008, February 1995.
  • 10[10]Jeffrey M.Bradshaw.An Introduction to software agents[M].AAAiPress/The Mit Press, 1997.

同被引文献2

  • 1Staniford-Chen S,Cheung S,Crawford R,Dilger M,Frank J,Hoagland J,Levitt K,Wee C,et.al.The design of grids:a graph based intrusion detection system for large networks.[R]Technical Reports.UC Davis,1999.
  • 2翁莉萍,赵仲孟.基于轻量级Agent的入侵检测模型[J].计算机工程,2002,28(5):155-157. 被引量:2

引证文献2

二级引证文献1

;
使用帮助 返回顶部