期刊文献+

基于代理技术的入侵防御系统研究 被引量:4

Study of Intrusion Prevention System Based on Agent Technology
下载PDF
导出
摘要 入侵防御系统是最近网络安全技术领域一个重要研究方向。文章针对目前入侵检测系统是以被动方式工作这一弊端,分别引入了分布处理、自治代理以及陷阱技术等主动防御思想,提出了一个基于智能代理的分布式主动入侵防御系统,并给出了该系统的详细设计结构、试验平台以及数据分析。实验结果表明该系统具有实时、可伸缩、主动等优点,能有效发现并阻止多种入侵行为,可以解决传统入侵检测系统长期以来存在的问题。 Nowadays Intrusion Prevention System(IPS) is an important research field in network security technology. Traditional Intrusion Detection System(IDS) usually function passively,cannot protect the system on time.In order to solve this drawback,the architecture of an active intrusion prevention system based on intelligent system has been constructed,combining the various active defense approaches,such as distributed processing,autonomous agent and deception technology and so on.Furthermore,the detailed design architecture,experimentation environment and data analysis are presented.The results show that the system possesses the desirable characteristics of real-time,scalability, active performance and so on,which can detect and prevent intrusion behaviors efficiently,and overcome the critical problems of the traditional IDS.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第31期116-118,188,共4页 Computer Engineering and Applications
基金 黑龙江省自然科学基金"智能网络安全系统研究"(编号:F2005-06)支持
关键词 入侵防御系统 网络攻击 网络安全 诱捕系统 智能代理 Intrusion Prevention System ,network attack ,network security ,network deception system ,Intelligent Agent
  • 相关文献

参考文献15

  • 1张勇,张德运,李胜磊.基于分布协作式代理的网络入侵检测技术的研究与实现[J].计算机学报,2001,24(7):736-741. 被引量:21
  • 2M C Bernardes,E S Moreira. Implementation of an Intrusion Detection System Based on Mobile Agents[C].In:IEEE International Symposium on Software Engineering for Parallel and Distributed Systems,2000-06.
  • 3D Burroughs ,L Wilson ,G Cybenko. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods[C].In:Proceedings of IEEE International Performance Computing and Communications Conference, 2002-04.
  • 4R S Gray,G Cybenko,D Kotz et al.D'Agents :Applications and performance of a mobile-agent system[J].Software :Practice and Exper, 2002; 32: 543~573.
  • 5W Jansen ,P Mell,T Karygiannis et al.Applying Mobile Agents to Intrusion Detection and Response. NIST IR-6416,1999-10.
  • 6C Krugel,T Toth. Applying Mobile Agent Technology to Intrusion Detection[C].In: 10th IEEE Workshop on Enabling Technologies :Infrastructure for Collaborative Enterprises,IEEE Computer Society Press, USA, 2001-06.
  • 7刘萍萍,周求湛,徐昊,申铉京.混合型分布式入侵检测系统模型[J].吉林大学学报(工学版),2004,34(4):666-670. 被引量:6
  • 8J Levine, R LaBella, H Owen et al.The Use of Honeypots to Detect Exploited Systems Across Large Enterprise Networks[C].In:Proceedings of the 2003 IEEE Workshop on Information Assurance,2003-06.
  • 9N Provos. Honeyd:A Virtual Honeypot Daemon(Extended Abstract)[C]. In: 10th DFN-CERT Workshop, Hamburg, Germany, 2003-02.
  • 10E H Spafford,D Zamboni.Intrusion detection using autonomous agents[J].Computer Network,2000;34(10) :547~570.

二级参考文献7

  • 1Staniford Chen S,Information Survivability Workshop Orlando FL Technical Report T12,1998年
  • 2BALASUBRAMANIYAN J S, GARCIA-FERNANDEZ J O, LSACOFF D.Architecture for intrusion detection using autonomous agents[R]. COAST Technical Report, COAST Laboratory, Purdue University, 1998.
  • 3DARPA. CIDF-common intrusion detection framework[DB/OL].http:∥www. gidos. Org, 2001-07-10.
  • 4ROESCH Martin. Snort-Lightweight intrusion detection for networks[C]∥Proceedings of the 13th Large Installation System Administration Conference, Washington, USA, 1999.
  • 5WENKE Lee, STOLFO S J, MOK K W. A data mining framework for building intrusion detection models[C]∥Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999.
  • 6CHRISTOPHER K, THOMAS Toth. Distributed pattern detection for intrusion detection[C]∥Proceedings of the Network and Distributed System Security Symposium Conference, 2002.
  • 7IDWG. The intrusion detection exchange protocol[DB/OL] http:∥www. Ietf. Org, Jan 2002.

共引文献24

同被引文献23

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部