期刊文献+

基于智能体的自适应入侵检测系统 被引量:1

An agent-based self-adaptive intrusion detection system
下载PDF
导出
摘要 提出了一种基于智能体技术的自适应入侵检测系统体系结构,将智能体技术和自适应模型生成技术应用于入侵检测系统中。智能体技术的应用解决了传统的集中式入侵检测系统的弊病,将任务处理和数据分布到网络各个结点上,通过各种智能体来协作完成入侵检测任务,充分利用网络和主机资源。而智能体与自适应模型生成技术相结合,采用遗传算法建立准确的数据模型,使得入侵检测系统能够自动配置和更新不同环境下的入侵检测模型,能够通过自我学习、自我改进来提高系统的入侵检测能力和适应能力。 An agent-based self-adaptive intrusion detection system is presented. Compared with the traditional centralized intrusion detection system the new system distributes tasks and data to every node in the network and uses a set of various cooperation agents to perform the intrusion detection. Hence it can make full use of the resources of the hosts and the network. This system integrates agents with self-adaptive model generation and adopts a genetic algorithm to create accurate data models. It can configure the parameters and renew the intrusion detection models on the fly. Through self-learning and self-improvement the detection ability and the self-adaptability of the system can be increased.
作者 李平 黄迪明
出处 《成都信息工程学院学报》 2004年第4期535-540,共6页 Journal of Chengdu University of Information Technology
关键词 自适应模型生成 入侵检测 智能体 遗传算法 self-adaptive model generation intrusion detection agent genetic algorithms
  • 相关文献

参考文献4

  • 1马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 2ISO/IEC.Information Technology-Security techniques-Evaluation criteria for IT security-Part 1:Introduction and general model[S].ISO/IEC 15408-1:1999,1999.
  • 3S.Snapp,J.Bretano,G Dias.DIDS:Motivation,Archiecture and an Early Prototype[R].Proceedings of the 14th Natioal Computer Security Conference,1991.
  • 4Eleazar Eskin,Matthew Miller,Zhi-Da Zhong.Adaptive Model Generation for Intrusion Detection Systems[R].Proceedings of the ACMCCS Workshop on Intrusion Detection and Prevention,2000.

二级参考文献7

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997

共引文献121

同被引文献9

  • 1Mukherjee B Heberlein,K Levitt.Network intrusion detection[J].IEEE Network, 1994 ; 8 (3) : 26-41
  • 2Sundaram A.An introduction to intrusion detection[J].Crossroads,The ACM Student Magazine,1996,2(4)
  • 3R Agrawal,T Imielinski,A Swami.Mining association rules between sets of items in large database[C].In:Proc SIGMOD'93,Washington,D C, 1993:207-216
  • 4Lee W,S Stolfo.Data mining approaches for intrusion detection[C].In: Proceedings of the 7^th USENIX security symposium(SECURITY '98 ) held in San Antonio,TX,1998:74-79
  • 5R Agrawal,A Swami.Fast algorithms for mining association rules[C].In : Proc VLDB '94,Santiago, Chile, 1994:487-499
  • 6D Cheung,J Han,V Ng et al.Maintenance of discovered association rules in large databases:An incremental updating technique[C].In: Proc ICDE' 96, New Orleans, LA, 1996 : 106-114
  • 7D Cheung,S Lee,B Kao.A general incremental technique for updating discovered association rules[C].In : Proc DASFAA' 97, Melbourne, Australia, 1997:185-184
  • 8Wenke Lee,Salvatore J Stolfo,Kui W Mok.Adaptive Intrusion Detection : A Data Mining Approach[C].In : Artificial Intelligence Review 14,2000:533-567
  • 9J Luo,S Bridges.Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection[J].Int' l J intelligent systems, 2000 ; 15(8) :687-703

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部