期刊文献+

基于分布式Agent的入侵检测系统研究

Research of intrusion detection system based on distributed agent
下载PDF
导出
摘要 随着网络入侵行为变得越来越普遍和复杂,传统的单一入侵检测系统已不能满足网络安全的发展需求,针对当前形势,为了提高计算机及网络系统的防御能力,提出了一种基于分布式Agent技术的入侵检测模型,并给出了一种可疑度算法和多IP地址连续报告策略,经测试和论证,系统可有效地阻止已知和未知的攻击行为,最后对系统的整体性能进行了详细描述。 Network-based attacks have become common and sophisticated. For this reason, traditional intrusion detection system based on single layer can't meet the increasingly growing network security's requirement. Under the situation, in order to improve resistive ca- pability of computer and network system , a prototype— — intrusion detection system is presented based on distributed agent, and then a doubt value algorithm and a multi-IP address sequential report policy are proposed. After testing and demonstrating, this system can prevent known and unknown attacks effectively. Finally, the whole capability of this system is particularly introduced.
作者 郑孝遥 陆阳
出处 《计算机工程与设计》 CSCD 北大核心 2005年第5期1241-1244,共4页 Computer Engineering and Design
关键词 入侵检测 分布式代理 网络安全 协作 AGENT intrusion detection distributed agent network security cooperative
  • 相关文献

参考文献10

  • 1张勇,张德运,李胜磊.基于分布协作式代理的网络入侵检测技术的研究与实现[J].计算机学报,2001,24(7):736-741. 被引量:21
  • 2Mukherjee B, Heberlein L T. Network intrusion detection [J].IEEE Network, 1994, (8):5-6.
  • 3Phil Porras, Dan Schnackenberg, Stuart Staniford-Chen. The common intrusion detection framework architecture [EB/OL].http://www.isi.edu/-brian/cidf/drafts/architecture.txt.
  • 4王晓程,刘恩德,谢小权.攻击分类研究与分布式网络入侵检测系统[J].计算机研究与发展,2001,38(6):727-734. 被引量:75
  • 5Thomas Daniels, Eugene Spafford. Identification of host audit data to detect attacks on Low-level IP [J]. Computer Security Archive, 1999, 7(1):35.
  • 6Steven J Templeton, Karl Levitt. A requires/provides model for computer attacks [C]. New York: ACM Press, Proceedings of New Security Paradigms Workshop, 2001.31-38.
  • 7Christopher Leckiey, Ramamohanarao Kotagiriz. Policies for sharing distributed probabilistic beliefs [C]. Australia:Adelaide,Dept CS & SE, Proceedings of the Twenty-Sixth Australasian Computer Science Conference, 2003. 285-290.
  • 8Florin Baboescu, George Varghese. Scalable packet classification [C]. New York:ACM Press, Source, Applications, Technologies, Architectures and Protocols for Computer Communication archive Proceedings, 2001. 199-210.
  • 9Peng Ning, X Sean Wang, Sushil Jajodia. Modeling requests among cooperating intrusion detection systems [J]. Computer Communications, 23(17): 1702-1715.
  • 10Andrew Moore, James Hall, Christian Kreibich. Architecture of a network monitor[C]. New York:ACM Press, Proceedings of the Fourth Passive and Active Measurement Workshop, 2003.77-86.

二级参考文献3

共引文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部