期刊文献+

基于XML的入侵检测主体通讯机制 被引量:1

XML Based Communication Mechanism Serving for Intrusion Detection Agents
下载PDF
导出
摘要 良好的通讯机制是基于多主体技术的分布式入侵检测系统正常运行的前提保证 ,根据入侵检测中主体间通讯的特点并结合我们所设计的基于多主体技术的分布式入侵检测系统 ADIDS的具体要求 ,设计了一种入侵检测主体之间进行入侵信息交换的通讯语言 IDACL,并在此基础上提出了一种基于 XML 的、适用于入侵检测主体间协作和信息交换的通讯机制 X- IDACM。 Good communication mechanism is the precondition assurance for multi-agent based distributed intrusion detection system to work well.Based on the agent communication characteristics in intrusion detection and the requirements of the multi-agent based distributed intrusion detection system-ADIDS designed by us,designed a communication language-IDACL for intrusion detection agents to exchange information.Furthermore,presented a XML based communication mechanism-X-IDACM is which suitable for intrusion detection agents to cooperation and exchange information.This communication mechanism will meet the requirements of communication between agents in the multi-agent based distributed intrusion detection system.
出处 《小型微型计算机系统》 CSCD 北大核心 2004年第12期2055-2060,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金重点项目 ( 90 10 40 3 0 )资助
关键词 分布式入侵检测系统 主体通讯 XML IDACL X—IDACM distributed IDS agent communication XML IDACL X-IDACM
  • 相关文献

参考文献8

  • 1Balasubrannaniyan, Garcia-Fiernandez.JO,lsacoff D. etal.Jai Sundar B. et al. An architecture for intrusion detection using autonomous agents[C]. In 14th IEEE Computer Security Application Conference, Dec.1998.
  • 2KQML:http://www.cs.umbc.edu/kqml/,march 2003.
  • 3Feiertag R,Kahn C,Porras P et.al. A common intrusion specification language(CISL)[EB/OL]. http://seclab.cs.ucdavis.edu/cidf/cisl_current.txt.
  • 4Curry D,Debar H.Intrusion detection message exchange format data model and extensible markup language (XML) document type definition[EB/OL]. http://www.ietf.org/,March,2003.
  • 5Shiau J Y, Ratchev M, Valtchanov G. Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system[C]. In:process of IEEE 9th International Workshops 14-10 June 2000,260-265.
  • 6Deitel H M, Deitel P J et al.XML how to program[M].Beijing:Tsinghua University Press 2000.
  • 7狄晓龙,庄镇泉,张仕山.移动智能体技术的安全机制研究[J].小型微型计算机系统,2004,25(4):493-496. 被引量:2
  • 8Kaariboga[EB/OL]. http://www.projectory.de/kaariboga/index.html.march 2003.

二级参考文献6

  • 1[1]Fuggetta A, Picco G P and Vigna G. Understanding code mobility[J]. IEEE Transactions on Software Engineering, 1998, 24(5):342~361.
  • 2[2]Dejan S. Milojicic, Markus Breugst, Ingo Busse, MASIF: The OMG mobile agent system interoperability facility[A]. Kurt Rothermel, Fritz Hohl(Eds.): Mobile Agents, Second International Workshop[C]. MA'98, Stuttgart, Germany, September 1998, Proceedings. Lecture Notes in Computer Science, Vol. 1477, Springer, 1999, 50~67.
  • 3[3]Steven J. Fritzinger, Marianne Mueller, Sun Microsystem,Inc. Java security[EB/OL]. URL:http://java.sun.com/security/whitepaper.ps.
  • 4[4]Joann J. Ordille. When agents roam, who can you trust?[C]. Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, 1996, 188 ~ 191.
  • 5[5]Sander T and Tshudin C. Towards mobile cryptography[C].Proceedings of the IEEE Symposium on Security and Privacy, California, U.S.A, 1998, 215~224.
  • 6[6]Necula G and Lee P. Safe kernel extensions without run-time checking[C]. Proceedings of the 2nd Symposium on Operating System Design and Implementation (OSDI '96), Seattle, Washington, USA, 1996,229~243.

共引文献1

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部