期刊文献+

基于自治代理的网络安全漏洞检测系统设计与实现

Design and Implementation of Network Security Leak Detection System Based on Autonomous Agent
下载PDF
导出
摘要 分析了黑客入侵计算机网络系统的手段 ,提出并设计出一种新型漏洞检测系统 .该系统以自治代理软件为核心 ,采用平台无关的技术实现 ,可移植性能良好 ,特别适用于检测分析异构型平台网络系统的漏洞和弱点 . By analyzing the means used by hackers to invade computer network systems, a new type of leak detection system is introduced and implemented. With the using of autonomous agent and irrespective platform technology in its prototype implementation ,the system have good portability. It also constitutes a useful framework for the testing and analyzing of the variable platform network's leak and vulnerability.
出处 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2002年第S1期200-206,共7页 Journal of Hunan University:Natural Sciences
关键词 漏洞检测系统 自治代理 黑客攻击 网络安全 leak detection system autonomous agent hacker attack network security
  • 相关文献

参考文献2

二级参考文献15

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980.
  • 9[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232.
  • 10[3]Biswanath, Mukherjee, Heberlein, L.Todd. Network intrusion detection. IEEE Network, 1994,8(3):26~41.

共引文献136

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部