期刊文献+

自组织层次式大规模网络入侵检测系统 被引量:1

Self-organized hierarchical massive network intrusion detection system
下载PDF
导出
摘要 在分析现有分布式入侵检测系统拓扑结构基础上,设计实现了自组织的层次式大规模网络入侵检测系统。该系统提出入侵检测节点之间自组织的概念,使用组织服务器来将分布式入侵检测系统的检测功能与组织功能分离开来,降低系统实现复杂性,并使系统中不再存在单点失败,当系统中部分检测节点失效后,系统的其余部分仍能够有效的工作。针对网络入侵检测节点,实现了一个完整的协议还原平台。在实际运行中,取得了良好的效果。 Based on the analysis of current distributed intrusion detection system topology, we design a self-organized hierarchical massive network intrusion detection system. We present the idea of self-organization between nodes, and separate detecting function from organizing function with organizer server in the distributed intrusion detection system. It reduces the implement complexity, and avoids the single point of failure. When some nodes of the system are out of work, the others still work well. We realize a complete protocol assembly platform. It does well in practice.
出处 《通信学报》 EI CSCD 北大核心 2004年第7期86-92,共7页 Journal on Communications
基金 国家"863"计划资助项目(8631040201) "十五"国防预研基金资助项目(41315.7.3 41316.3.3)
关键词 入侵检测 自组织 层次结构 大规模网络 intrusion detection self-organized hierarchy massive network
  • 相关文献

参考文献10

  • 1SNAPP S R, SMAHA S E, GRANCE T, et al The DIDS (distributed intrusion detection system) prototype[A]. USENIX, Summer 1992 Technical Conference[C]. San Antonio USA, 1992. 227-233.
  • 2HEBERLEIN L T, MUKHERJEE B, LEVITT K N. Internet security monitor: an intrusion detection system for large-scale networks[A]. Proc of the 15th National Computer Security Conference[C]. Baltimore, MD, 1992. 262-271.
  • 3HOCHBERG J, JACKSON K, STALLINGS C, et al. NADIR: an automated system for detecting network intrusions and misuse[J]. Computers and Security, 1993, 12(3):253-248.
  • 4KEMMERER R A. NSTAT: A Model-based Real-time Network Intrusion Detection System[R]. Technical Report TRCS-97-18, Department of Computer Science, UC Santa Barbara, November 1997.
  • 5HABRA N, LE CHARLIER B, MOUNJI A, et al. ASAX: software architecture and rule-based language for universal audit trail analysis[A]. Proc of the 2nd European Symposium on Research in Computer Security (ESORICS' 92)[C]. Toulouse, France, 1992. 435-450.
  • 6CROSBIE M, SPAFFORD E H. Defending a computer system using autonomous agents[A]. Proc of the 18th National Information Systems Security Conference[C]. Baltimore, MD, 1995. 549-558.
  • 7ZHANG Z, LI J, MANIKOPOULOS C, et al. HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification[A]. CD-ROM Proceedings of the 2nd Annual IEEE Systems, Mans, Cybernetics Information Assurance Workshop[C]. West Point, NY, 2001. 85-90.
  • 8NING P, JAJODIA S, WANG X S. Abstraction-based intrusion detection in distributed environments[J]. ACM Transactions on Information and System Security (TISSEC), 2001,4(4):407-452.
  • 9JANAKIRAMAN R, WALDVOGEL M, ZHANG Q. Indra: a peer-to-peer approach to network intrusion detection and prevention[A]. Proc 2003 IEEE WET ICE Workshop on Enterprise Security[C]. Linz, Austria, 2003. 1-6.
  • 10HELMER G, WONG J S K, HONAVAR V, et al. Lightweight agents for intrusion detection[J]. Journal of Systems and Software, 2003, 67(2):109-122.

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部