期刊文献+

一种基于环形结构的新型分布式入侵检测模型 被引量:2

A New Model of Distributed Intrusion Detection Based on Ring Structure
下载PDF
导出
摘要 分析了目前的分布式入侵检测系统的特点和协作方式,提出了基于逻辑环形分布式协作控制技术的分布式入侵检测模型,解决了目前分布式入侵检测系统中各系统间协作效率低、配置复杂、检测响应慢等缺陷。详细论述了环形结构的分布式入侵检测系统的体系结构和系统框架,提出了一套基于环形结构的分布式入侵检测协作算法。 Through analyzing the characteristics of the present distrthuted intrusion detection system and the cooperating model, this paper proposes a set of distributed detection intrusion system (DIDS) based on the logical ring distributed cooperating control model, which is able to overcome some shortcomings of the present DIDS such as the low cooperation efficiency, the complex configuration and the slowness of the detecting response and so on, The architecture and the system model of the DIDS based on the ring structure are presented in detail. Furthermore, it proposes a set of practical algorithms of the DIDS based on ring structure.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第23期143-145,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60373085)
关键词 分布式入侵检测模型 环形协作算法 系统框架 Distributed intrusion detection model Ring cooperation algorithms System framework
  • 相关文献

参考文献9

  • 1James E Anderson Computer Security Thread Monitoring and Surveillance[R]. Technical Report. James P Anderson Co., Fort Washington, Pennsylvania, 1980.
  • 2Chen S, Tung B, Schnackenberg D. The Common Intrusion Detection Framework-data Formats[EB/OL].Internet Draft Draft-ietf-cidf-data-formats-00. Txt, 1998.
  • 3Timmis J, Knight T. Artificial Immune System: Using the Immune System as Inspiration for Data Mining[C]. Hershey: Idea Publishing Group, 2001:209-230.
  • 4Nolfi S, Florano E Learning and Evolution[J]. Autonomous Robots,1999,7(1):89-113.
  • 5Polla D, McConnell J, Johnson T, et al. A Framework for Cooperative Intrusion Dection[C]. 21^th National Information Systems Security Conference, 1998.
  • 6Janakiraman R, Waldvogel M, Zhang Q. lndra:A Peer-to-Peer Approach to Network Intrusion Detection And Prevemion[C]. In:Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security.Linz, Austria, 2003-06.
  • 7Ning E Wang X, Jajodia S. Modeling Requests Among Cooperating Intrusion Detection System[J]. Computer Communications, 2002,23 (7):702-1715.
  • 8马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 9李旺,吴礼发,胡谷雨.分布式网络入侵检测系统NetNumen的设计与实现[J].软件学报,2002,13(8):1723-1728. 被引量:31

二级参考文献11

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8[1]Allen, J., Christie, A., Fithen, W., et al. State of the practice of intrusion detection technologies. CMU/SEI-99-TR-028, 2000. http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028abstract.html.
  • 9[2]Stevens, W.R. Unix Network Programming (Vol.1) Networking APIs: Sockets and XTI(2nd ed.). Prentice Hall PTR., 1998.
  • 10[3]Roesch, M. Snort-Lightweight Intrusion Detection for Networks. In: Proceedings of the USENIX LISA'99 Conference. http://www.usenix.org/events/lisa99/full_papers/roesch/roesch.pdf

共引文献148

同被引文献8

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部