期刊文献+

基于智能代理的分布式入侵检测系统模型 被引量:7

Model of Distributed Intrusion Detection System Base on Mobile Agents
下载PDF
导出
摘要 本文针对通用入侵检测系统的存在的缺陷,分析了Agent的特性,提出了一种基于智能Agent的分布式入侵检测系统模型。该模型利用Agent的移动、自治特性,将基于主机和基于网络的入侵检测结合起来,增强了入侵检测系统对分布式网络的协同检测能力,有效降低网络通信负荷,提高系统自身的安全性。文章阐述了该模型实现的关键技术并对系统性能进行了评价。 The flaw of general intrusion detection system and the characteristic of intelligent agent are analyzed. A model of distributed intrusion detection system base on mobile agent is proposed. The model combines the two detection technologies based on host and network and enhances the security and collaborative detection capability. The article elaborates the key technologies and appraises the performance of the system model.
作者 李荣鑫
出处 《微计算机信息》 北大核心 2008年第6期72-73,27,共3页 Control & Automation
基金 江西省社会发展攻关项目(2005132) 南昌大学校基金资助项目(2006)
关键词 入侵检测 智能代理 分布式 Intrusion Detection Mobile Agent Distributed
  • 相关文献

参考文献5

二级参考文献10

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8Rakesh Arora.Voice over IP:Protocols and Standards [DB/OL]. http://http.netlab.ohio-state.edu/pub/jain/courses/cis788-99/voip_protocola/index.html.
  • 9DataBeam Corp.A Primer on the H.323 Series Standard Version 2.0,24 pages [S/OL]. http://www.databeam.com/h323/h323primer.html.
  • 10Toga J. Demystifying Multimedia Confetencing Over the Internet Using the H.323 Set of Standards, Intel Technology Journal, Q2, 1998[J/OL]. hap://developer.lntel.com/technology/itj/q21998/articles/art_4.htm.

共引文献135

同被引文献41

引证文献7

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部