期刊文献+

移动Agent在IDS中的应用及其安全性研究

The Research On Application And Security Of Mobile Agent In Intrusion Detection System
下载PDF
导出
摘要  传统的入侵检测系统(IDS)受环境因素与技术因素的影响很大,而移动Agent具有迁移性、智能性、协作性和分布灵活性,可以按照系统和网络异常使用模式的不同特征和环境差异进行检测,更准确地把握入侵行为.现对移动Agent在入侵检测系统中的应用进行了研究,并对移动Agent本身的安全性问题进行了讨论. Compared with the conventional intrusion detection system, which is greatly affected by environment and techniques, motible agent is removable, intellective, collaborative, accurate and flexible. It defines the intrusion behavior accurately by detecting the differentiation on both character and environment of the abnormal acting patten of system and networks. The arcicle below is about the application of mobile agent in intrusion detection. Moreover, it also get the security of mobile agent involed.
出处 《云南民族大学学报(自然科学版)》 CAS 2005年第1期86-88,共3页 Journal of Yunnan Minzu University:Natural Sciences Edition
关键词 移动AGENT IDS 入侵检测系统 安全性 网络安区 计算机安全 mobile agent intrusion detection security
  • 相关文献

参考文献15

  • 1万燕,朱向华,孙永强.一个安全的移动代理系统的访问控制策略[J].计算机工程,2002,28(3):16-17. 被引量:1
  • 2万燕,孙永强,朱向华,唐进.采用增量时间戳安全技术的Mobile Agent系统[J].软件学报,2002,13(7):1331-1337. 被引量:3
  • 3高泽胜,陶宏才.下一代入侵检测系统NIDES的实现机制[J].云南民族大学学报(自然科学版),2003,12(4):255-257. 被引量:2
  • 4Midori Asaka, Shunji Okazawa, Atsushi Taguchi, and Shigeki Goto. A Method of Tracing Intruders by Use of Mobile Agents[C]. INET'99 Conference, June, 1999.
  • 5Wenke Iee, Sal Stolfo, and Kui Mok. A Data Mining Framework for Building Intrusion Detection Models[C]. IEEE Symposium on Security and Privacy, May, 1999:120 - 132.
  • 6Guy Hehner, Johnny S. K. Wong, Vasant Honavar, and Les Miller. Intelligent Agents for Intrusion Detection[C]. IEEE Information Technology Conference, Sep, 1998:121 - 124.
  • 7Serge Fenet and Sahma Hassas. A Distributed Intrusion Detection and Response System Based on Mobile Autonomous Agents Using Social Insects Communication Paradigm[ C]. First International Workshop on Security of Mobile Multiagent Systems, Autonomous Agents Conference, May,2001.
  • 8F Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. In G Vigna, editor, Mobile Agents and Security[A]. Lecture Notes in Computer Science[C]. Springer- VerLag, 1998,vol. 1419:92- 113.
  • 9Tomas S, Christain T. Protecting Mobile Agents Agmnst Malicious Host[EB/OL]. Http://www. icsi .berkeley.edu/sander/publications .
  • 10Vigna G. Protecting Mobile Agents Through Tracing[ C]. In 3th ECOOP Workshop on Mobile Object System, Finland, Jun, 1997.

二级参考文献6

  • 1朱向华.移动对象系统安全机制与名字服务的设计与实现:硕士学位论文[M].上海:上海交通大学,2000..
  • 2BaeeG 陈明奇 吴秋新译.入侵检测[M].北京:人民邮电出版社,2002..
  • 3Bace G 陈明奇 吴秋新译.入侵检测[M].北京:人民邮电出版社,2002..
  • 4Anderson J P. Computer Security Threat Monitoring and Surveillance[R]. Technical Report James P. Anderson Co. Fort Washington,Pennsylvania. 1980.4.
  • 5马俊涛,刘积仁.Mobile Agent体系结构及关键技术探讨[J].小型微型计算机系统,1998,19(2):7-14. 被引量:49
  • 6何明耘,戴冠中.智能入侵检测技术发展概貌[J].计算机工程与应用,2001,37(15):1-4. 被引量:11

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部