期刊文献+

一种基于移动agent的入侵检测系统框架研究 被引量:4

Research on a mobile agent-based intrusion detection system architecture
下载PDF
导出
摘要 提出了一种新结构———基于移动agent技术的IDS,并对此结构的优缺点作了详细的分析,对研究基于移动代理技术的入侵检测系统具有一定的指导作用.MA IDS采用移动agent技术共同合作处理每个被监控主机的信息,然后完成全局入侵者行为的信息提取.主要讲述了系统的结构模型和系统各个组件的功能,最后讨论了系统的特点和有待改进的地方. A novel architecture,MA-IDS, is proposed,and its advantages and disadvantages are discussed. It can help identify the agent-based intrusion detection system. MA-IDS employs MA technology to coordinately process information from each monitored host, and then completes global information extraction of intruder actions. The structure model and function of each component in the system are introduced. Finally the characteristics of the system and some points that need to be improved are discussed.
出处 《应用科技》 CAS 2005年第3期49-51,共3页 Applied Science and Technology
基金 国防十五预研重点资助项目(413150702)
关键词 移动AGENT 入侵检测 MA—IDS mobile agent intrusion detection MA-IDS
  • 相关文献

参考文献4

  • 1张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..
  • 2LI Chunsheng,SANG Qingfeng,ZHANG Cheng-qi. MA-IDS Architecture for Distributed Intrusion Detection using Mobile Agents [ A]. in Proceedings of the 2nd ICITA, Harbin, China, 2004.
  • 3JANSEN W. Intrusion detection with mobile agents [ A ].Comput Commun ,2002,25 : 1392 - 1401.
  • 4KR GEL C, TOTH T. Applying mobile agent technology to intrusion detection[ A]. ICSE Workshop on Software Engineering and Mobility[ C]. 2001 : 15 - 18.

共引文献132

同被引文献21

  • 1满红芳,宿超,马春清.基于Agent的分布式入侵检测系统模型的研究与设计[J].山东电大学报,2006(1):38-39. 被引量:3
  • 2Barber Richard. TheEvolution of Intrusion DetectionSystems-theNext- Step. computer&Security ,2001,28 ( 5 ) : 132 - 145.
  • 3Susan C L,David V H. Training a Neural-network Based Intrusion Detector[ J]. IEEE Transaction son systems, manandcybemetics-parta : System and Humans,2001,31 (4) :294 - 299.
  • 4Balajinath B, Raghavan S V. Intrusion detection through learning behavior model [ J ]. Computer Communications, 2005,24 ( 12 ) : 1202 -1212.
  • 5Steven A H. An Immunological Model of Distributed Detection and Its Application Computer Security[ D ]. PhDthesis. NEWmexico. The University of NewMexico, 1999.
  • 6Manganaris, et al. A data mining analysis of RTID alarms [ J ] Computer Networks,2004, 34(4) :571 -577.
  • 7国家计算机病毒应急处理中心.2008年全国信息网络安全状况与计算机病毒疫情调查分析报告[R].[2008-10].http://www.antivirus-china.org.cn/head/diaocha2008/report1.ppt.
  • 8金山毒霸.2008年中国电脑病毒疫情及互联网安全报告[R].[2009-02].http://news.duba.net/contents/2009-02/05/6235.html.
  • 9Lippmann R P, Cunningham R K. Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks [ J ]. Computer Networks-the International Journal of Computer and Telecommunications Networking,2000,34 (4) :597 -603.
  • 10OTAIR M, SALAMEH W. Speeding up back propagation neural networks [ C ]. Proceedings of the 2005 Informing Science and IT Education Joint Conference, Flagstaff Arizona, USA,2005 ( 1 ) : 167 - 173.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部