期刊文献+

基于中间件的分布式网络异常检测系统 被引量:1

A Distributed Network Anomaly Detecting System Based on CORBA
下载PDF
导出
摘要 文章介绍了网络异常的概念和思路,然后对中间件技术做了分析比较,重点提出了一种基于中间件的分布式网络异常检测系统。该系统采用CORBA实现分布式交互,能对网络异常进行分布式检测,与单点异常检测系统相比具有更高的实时性和处理数据的能力,对大型网络效果更好。本系统通过MIB变量相关联地剧烈突变来检测异常的发生。CORBA标准定义的比较完善的安全体系结构使本系统自身的安全性得到了保证。 This paper introduce the concept and thought of network anomaly detection, then analyze and compare the techniques of middleware, and lay emphasis on designing of a distributed network anomaly detection system based on middleware. The system achieves distributed communication through CORBA, and can detect network anomalies through distributed way. It is more real-time and has better ability on data processing compared with single point detection, especially for large network. Anomaly can be detected through correlated abrupt changes of MIB variables. The well defined security framework of CORBA has ensured this network anomaly detection system's own security.
出处 《微电子学与计算机》 CSCD 北大核心 2006年第z1期15-17,19,共4页 Microelectronics & Computer
关键词 网络异常检测 分布式 中间件 CORBA MIB Network anomaly detection, Distributed, Middleware, CORBA, MIB
  • 相关文献

参考文献4

二级参考文献11

  • 11The Object Management Group, The Common Object Request Broker:Architecture and Specification, Version 2.2, Feburary 1998
  • 22The Object Management Group, Security Service Specification, Version 1.5, March 1999
  • 33TECS: Papers: A Quick Tour of the CORBA Security Service, July 1998
  • 4[1]Richard Heady,George Luger,Arthur Maccabe et al.The architecture of a network level intrusion detection system[R].Technical Report CS90-20,Department of Computer Science,University of New Mexico,990
  • 5[2]J PAnderson.Computer Security Threat Monitoring and Surveillance [R].Technical report,James P Anderson Co.,Fort Washington,Penn sylvania, 1980
  • 6[3]Dorothy E Denning. An intrusion-detection model [J].IEEE Transac tions on Software Engineering, 1987; 13 (2): 222~232
  • 7[4]Teresa L,Jagannathan R,Lee R et al.IDES:The enhanced prototype, a real-time intrusion detection system[R].Menlo Park,CA:SRI Inter national ,Computer Science, 1988
  • 8[5]Crosbie M,Spafford G.Applying genetic programming to intrusion de tection [R].Purdue University:Department of Computer Sciences,Coast Laboratory, 1997
  • 9[6]L Todd Heberlein.Network Security Monitor Final Report [DB/OL]. http:∥seclab.cs.ucdavis.edu/papers/NSM-fi nal.pdf, 1993
  • 10[7]The Object Management Group,The Common Object Request Broker:Architecture and Specification[S].Version 2.4.2,2001

共引文献12

同被引文献20

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部