期刊文献+

混合型分布式入侵检测系统模型 被引量:6

Hybrid distributed detection system module
下载PDF
导出
摘要 在分析入侵检测研究现状的基础上,对分布式入侵检测系统广泛采用的基于组件和基于代理的两种分布式入侵检测模型进行了深入的研究。结合两种模型设计了一种基于网络入侵检测系统和基于主机入侵检测系统的混合型分布式入侵检测系统,并对系统各部分的功能、工作流程、消息格式、通信方法展开了讨论。最后给出了系统的部署方案以及实验过程。实验结果表明:该系统可以准确地检测出以上多种类型的攻击行为,并及时地采取相应措施,阻断攻击者的网络连接。 The research status on intrusion detection was studied and the analysis was conducted for the component based and agent based distribution intrusion modules in distribution intrusion detection systems. Combined these two modules, a hybrid distributed intrusion detection system(HIDS) on the basis of network based intrusion system(NIDS) and mainframe intrusion detection system(MIDS) was designed. Functions in the different parts of the system, working procedure, message format, and communication method were discussed. Then the system deployment scheme and experiment process were given. The experimental results show that the system can accurately detect various intrusion actions and quickly take countermeasures to block intrusive connections.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2004年第4期666-670,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 吉林省科技发展计划资助项目(20030313) 吉林大学创新基金资助项目(2003cx038).
关键词 计算机系统结构 分布式入侵检测 组件 代理 消息格式 structure of computer system distributed intrusion detection component agent message format
  • 相关文献

参考文献6

  • 1BALASUBRAMANIYAN J S, GARCIA-FERNANDEZ J O, LSACOFF D.Architecture for intrusion detection using autonomous agents[R]. COAST Technical Report, COAST Laboratory, Purdue University, 1998.
  • 2DARPA. CIDF-common intrusion detection framework[DB/OL].http:∥www. gidos. Org, 2001-07-10.
  • 3ROESCH Martin. Snort-Lightweight intrusion detection for networks[C]∥Proceedings of the 13th Large Installation System Administration Conference, Washington, USA, 1999.
  • 4WENKE Lee, STOLFO S J, MOK K W. A data mining framework for building intrusion detection models[C]∥Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999.
  • 5CHRISTOPHER K, THOMAS Toth. Distributed pattern detection for intrusion detection[C]∥Proceedings of the Network and Distributed System Security Symposium Conference, 2002.
  • 6IDWG. The intrusion detection exchange protocol[DB/OL] http:∥www. Ietf. Org, Jan 2002.

共引文献1

同被引文献50

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部