期刊文献+

基于自治Agent的入侵防御系统模型探讨

Research on autonomous agent-based Intrusion Prevention System model
下载PDF
导出
摘要 本文首先分析了在面对越来越多新型网络攻击时,当前主流网络安全产品存在的不足之处,然后简单介绍了入侵防御系统和自治Agent,最后,提出利用自治Agent的良好特性,构建基于自治Agent的入侵防御系统模型,详细讨论了结构中各组件的功能、工作流程和主要特性。 This paper firstly analyzes the insufficiency of the current network security products, when facing more and more new-type network attacks. Then, it introduces Intrusion Prevention System(IPS) and autonomous agent. Finally, on the basis of excellent features of autonomous agent, it proposes a model of autonomous agent-based Intrusion Prevention System(IPS) , and discusses the functions of the model's components, its working process and primary characteristics.
作者 李浩 叶柯
出处 《宁波广播电视大学学报》 2005年第2期90-93,共4页 Journal of Ningbo Radio & TV University
关键词 入侵防御系统模型 自治AGENT 网络安全 防火墙 网络防护机制 intrusion prevention autonomous agent network security
  • 相关文献

参考文献5

二级参考文献12

  • 1S R Snapp, S E Smaha, D M Teal et al. The DIDS (distributed intrusion detection system) prototype. In: USENIX Association.Proc of the Summer 1992 USENIX Conf. Berkeley, CA, USA:USENIX Association, 1992. 227--233.
  • 2S Staniford-Chen, S Cheung, R Crawford et al. GrlDS---A graph based intrusion detection system for large networks. The 19th National Information Systems Security Conference (NISSC),Baltimore, MD, USA, 1996. 1:361-370.
  • 3J S Balasubramaniyan, J O Garcia-Fernandez, D Lsaeoff et al.Architecture for intrusion detection using autonomous agents.COAST Laboratory, Purdue University, COAST Tech Rep: 98-05, 1998. http://www. cerias. purdue.edu/homes/aafid/docs/tr9805, pdf.
  • 4P A Porras, P G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. The 20th National Information Systems Security Conf(NISSC), Baltimore,MD, USA, 1997.353-365.
  • 5J Pickel, R Danyliw. Enabling automated detection of security events that affect multiple administrative domains.Information Networking Institute, Carnegie Mellon University, Pittsburgh,PA, USA, 2000. http://www. incident.org/thesis/bookl. html.
  • 6C Krugel, T Toth. Distributed pattern detection for intrusion detection. The Network and Distributed System Security Symposium Conf, San Diego, CA, USA, 2002.
  • 7S Staniford-Chen, B Tung, D Schnackenberg. The common intrusion detection framework (CIDF) . The 1st Information Survivability Workshop, Orlando, FL, USA, 1998.
  • 8T Bass. Intrusion detection systems and multisensor data fusion.Communications of the ACM, 2000, 43(4) : 99--105.
  • 9Intrusion Detection Working Group. The Intrusion Detection Exchange Protocol (IDXP) . 2002. http://www.ietf.org/internet-drafts/draft-ietf-idwg-beep-idxp-04, txt.
  • 10Intrusion Detection Working Group. Intrusion detection message exchange format data model and extensible markup language(XML) document type definition. 2001. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-06. txt.

共引文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部