期刊文献+

一种分布式入侵检测系统的实现 被引量:4

The Implementation of a Distributed Intrusion Detection System
下载PDF
导出
摘要 由于TCP/IP协议是一个开放的协议,因此网络极易受到攻击。为了能够有效地检测到入侵行为,提出了一种基于部件的分布式入侵检测系统,并结合网管软件系统的开发,在Linux环境下进行了实现。系统主要由控制台、分析系统、存储系统、响应系统、网络引擎和主机代理构成。通过协同工作并采用改进了的Boyer-Moore算法,检测网络入侵行为,有效地维护了信息网络的安全。 Because of the open structure of TCP / IP, the network is vulnerable to attack. In order to availably detect the intrusion, an intrusion detection system based on components is presented, and the implementation of it in Linux environment is made in combination with the development of NMS software. The system consists of manager console, analyzer, storage system, response system, network engine and host agent. By operating cooperatively and using the improved Boyer-Moore algorithm, the network intruding acts can be detected effectively and the information network security is defended.
出处 《空军工程大学学报(自然科学版)》 CSCD 2004年第5期85-88,共4页 Journal of Air Force Engineering University(Natural Science Edition)
基金 国家高技术发展计划(863)基金资助项目(2002A143020)
关键词 入侵检测 网络引擎 网络安全 intrusion detection network engine network security
  • 相关文献

参考文献5

  • 1[1]Tidwell T,Larson R,Fitch K,et at.Modeling Internet Attacks[A]. Proceedings of The 2001 IEEE Workshop on Information Assurance and Security[C].2001.54-59.
  • 2[2]Guy Gary Helmer. Intelligent Muiti-Angent System for Intrusion Detection and Countermeasures [D].PhD thesis, Iowa State University,2000.
  • 3[3]Denning A. An intrusion Detection Mmodel[J]. IEEE Transaction on Software Engineering, 1987,13(2):222-232.
  • 4朱杰,黄烟波,翁艳彬.入侵检测中的快速过滤算法[J].计算机工程,2003,29(16):109-110. 被引量:4
  • 5范西昆,郑连清,樊昌周,霍文俊.一种基于移动代理的入侵检测系统[J].空军工程大学学报(自然科学版),2001,2(6):78-81. 被引量:1

二级参考文献8

  • 1[1]Crosbie M , Spfford.E Defending a computer system using autonomous agents. 95-022, COAST Laboratory , Purdue University IN 47907-1398, 1994.
  • 2[2]Eugene H. Spafford, Diego Zanboni. Intrusion detection using autonomous agents. IEEE Computer Network, 2000,34(8): 547-570.
  • 3[3]Bradshaw J. Software Agent. Cambridge MA: MIT Press. 1996.
  • 4Boyer R S, Moore J S. A Fast String Searching Algorithm.,Communications of the ACM, 1977,(20).
  • 5Horspool R N, Practical Fast Searching in Strings. Software Practice and Experience, 1980 (10).
  • 6Kim,Kim Y.A Fast Multiple String-pattem Matching Algorithm.Proceedings of the 17th AoM/laom Intemational Conference on Computer Science, 1999-05.
  • 7Knuth D, Morris J, Pratt V. Fast Pattem Matching in Strings. SIAM Journal on Computing, 1977, (6).
  • 8Gusfield D. Algorithms on Strings, Trees, and Sequences. Computer Science and Computational Biology, 1997.

共引文献3

同被引文献22

  • 1韩仲祥,史浩山,王元一.实时入侵检测系统的优化问题研究[J].计算机工程与应用,2004,40(29):15-17. 被引量:2
  • 2陈铁柱.Snort规则集的优化[J].海军航空工程学院学报,2005,20(6):664-666. 被引量:6
  • 3韩仲祥,史浩山,庄绪春.基于MIB II的IDS实现研究[J].空军工程大学学报(自然科学版),2006,7(4):55-59. 被引量:4
  • 4孙即祥.现代模式识别[M].长沙:国防科技大学出版社,2003-08..
  • 5Samuel Patton,William Yurcik,David Doss.An Achilles Heel in Signature-Based IDS:Squealing False Positives in SNORT[A].Proceedings of the Fourth International Symposium on Recent Advances[C].2001,10 -12.
  • 6Lee W,Xiang D.Information -Theroetic Measures for Anomaly Detection[A].Proceedings of the 2001 IEEE Symposium on Security and Privacy[C].2001.
  • 7Common Object Request Broker Architecture v 3.0.OMG[S].
  • 8张焕国.计算机安全保密技术[M].北京:机械工业出版社,2005.
  • 9Blaze M,Strauss M.Distributed Trust Management[J].Proc.IEEE Symposium on Security and Privacy,2005,3(6):146-152.
  • 10史殿习.StarBus 5.0程序员指南手册[M].长沙:国防科技大学出版社,2004.

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部