期刊文献+

基于协同侦测技术的移动主体模型验证策略研究

Model Checking Strategy of Mobile Agent Based on Technology of Collaborative Detection
下载PDF
导出
摘要 移动主体模型可以实现协同侦测网络攻击和区域预警的功能;它利用元组空间(TUPLE SPACE)构建移动主体服务集群(RMAS CMAS)网络结构及侦测ARP攻击的主体.为了证明该模型逻辑的有效性,验证策略设计了可以分析ARP攻击数据包从初始组态到终结组态的动态空间树;利用空间树嵌套演算推理协同侦测系统的组态迁移过程,分析模块的动态移动重组以及消息的并行传递机制.对模型验证策略的研究可以消除在模型设计阶段出现的冗余组态,提高移动系统的设计水平. The mobile agent model achieves the goal of collaborative detection of network intrusion when attacks occur in a vast region. The architecture of service cluster (RMAS-CMAS) is described as well as mobile agent for detecting ARP attack via the concept of Tuple-Space. To check the effectiveness of the system detection logic, model checking strategy enables us to build dynamic spaces tree from initial configuration to terminative configuration which is used to analyze packets of ARP attack. Transference of collaborative detection system configurations, dynamic re-compose of modules and message parallel transfer mechanism are ratiocinated by calculation of nested spaces tree. Study of model checking strategy can eliminate the redundance configurations which exist in the model design and help to improve quality of the design of mobile system.
出处 《计算机学报》 EI CSCD 北大核心 2005年第5期921-926,M003,共7页 Chinese Journal of Computers
基金 国家自然基金重点项目(90104030) 中国科学技术大学青年基金资助.~~
关键词 移动主体 元组空间 模型验证 组态迁移 Computer supported cooperative work Mathematical models Mobile telecommunication systems Network protocols Security systems Trees (mathematics)
  • 相关文献

参考文献9

  • 1Jansen W., Mell P., Karygiannis T., Marks D. Applying mobile agents to intrusion detection and response. National Institute of Standards and Technology, USA: Technical Report 6416, 1999
  • 2Milner R. Communicating and Mobile Systems: The π-Calculus. Cambridge: Cambridge University Press, 1999
  • 3de Nicola R., Ferrari G.L., Pugliese R. KLAIM: A kernel language for agents interaction and mobility. IEEE Transactions on Software Engineering, 1998, 24(5): 315~330
  • 4McCann P.J., Roman Gruia-Catalin. Compositional programming abstractions for mbile computing. IEEE Transactions on Software Engineering, 1998, 24(2): 97~110
  • 5Mascolo C. Formalization analysis and prototyping of mobile CodeSystem[Ph.D. dissertation]. Bologna: University of Bologna, 2001
  • 6Balasubramaniyan J.S., Garcia-Fernandez J.O., Isacoff D., Spafford E.H., Zamboni D. An architecture for intrusion detection using autonomous agents. In: Proceedings of Asia-Pacific Computer Systems Architecture Conference, 1998, 13~24
  • 7Ciancarini P., Franze F., Masoolo C. A coordination model to specify system including mobile agents. In: Proceedings of International Workshop on Software Specification and Design, 1998, 96~105
  • 8Deng Wei, Chen Ming-Qi, Ai Bo. Enhancing authenticating mechanism with mobile agent in mobile communication system. In: Proceedings of IEEE VTC2000, 2000
  • 9Karnouskos S. Dealing with denial-of-service attacks in agentenabled active and pogrammable infrastructures. In: Proceedings of the 25th IEEE International Computer Software and Applications Conference, 2001, 8~12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部