期刊文献+

基于Super-Peer架构的分布式入侵检测模型研究 被引量:1

On a Distributed Intrusion Detection Model Based on the Super-Peer Framework
下载PDF
导出
摘要 随着大规模分布式入侵行为的日益增多,对分布式入侵检测系统的性能要求也越来越高。本文提出了一种基于Super-Peer架构并采用智能Agent技术的分布式入侵检测系统模型,将Super-Peer模型与分布式入侵检测系统有效地结合,克服了纯P2P模型可管理性差的缺点,提高了入侵检测系统的效率和协作检测能力,增强了系统的开放性,减少了层次化带来的瓶颈,从整体上提高了系统的性能。 As the distributed intrusion becomes serious, the performance demand for distributed intrusion detection systems will be more and more important. In this paper, the concept of the Super-Peer intrusion detection model (SPIDM) is proposed. Furthermore, the technology of intelligent agent is implemented in this model As a result, this efficient combination of distributed intrusion detection systems with the super-peer framework increases the system efficiency and collaboration, enhances the system openness, and thus improves the system performance as a whole
出处 《计算机工程与科学》 CSCD 2005年第8期10-12,19,共4页 Computer Engineering & Science
关键词 分布式入侵检测 SUPER-PEER 数据融合 distributed intrusion detection Super-Peer data fusion
  • 相关文献

参考文献8

  • 1S R Snapp, S E Smaha, SE Grance, et al. The DIDS(Distributed Intrusion Detection System) Prototype[A]. Proc of Summer 1992 USENIX Conf[C]. 1992. 227-233.
  • 2J S Balasubramaniyan, J O Carcia-Fernandez,D Isaco, et al. Architecture for Intrusion Detection Using Autonomous Agents[R]. Techical Repert 98-05,COAST Laboratory, Purdue University, 1998.
  • 3P A Porras, P G Neumann. EMERALD:Event Monitoring Enabling Responses to Anomalous Live Disturbances[A]. The 20th National Information System Security Conf(NISSC)[C]. 1997. 353-365.
  • 4Fiorano Software, Inc. Whitepaper:Super-Peer Architectures for Distributed Computing[Z].2001.
  • 5Ramaprabhu Janakiraman, Marcel Waldvogel, Qi Zhang. Indra:A Peer-to-Peer Approach to Network Intrusion Detection and Prevention[A]. Proc of IEEE WETICE 2003 Workshop on Enterprise Security[C]. 2003.
  • 6Martin Roesch. Snort-Lightweight Intrusion Detection for Networks[A]. The 13th Large Installation System Administration Conf[C]. 1999.
  • 7Stephen Northcutt, Mark Cooper, Matt Fearnow, et al. Intrusion Signatures and Analysis[M]. New Riders Publishing, 2001.
  • 8T Bass. Intrusion Detection Systems and Multisensor Data Fusion[J]. Communications of the ACM, 2000, 43(4):99-105.

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部