期刊文献+

基于代理的分布式入侵检测系统中网络代理的相关技术研究 被引量:1

Network Agent Techniques in Agent-Based on Distributed Intrusion Detection System
下载PDF
导出
摘要 介绍一个基于代理的分布式入侵检测系统的模型框架及其网络代理的结构设计,研究在W indow s的环境下,利用网络代理技术的入侵检测方法,讨论网络代理的通信、网络数据采集与解析、协议分析等模块的相关实现技术。 The framework model of an agent-based the architecture design of its network agent are on distributed intrusion detection system and introduced. The intrusion detection method through network agent techniques is analyzed. The relevant techniques about the communication between network agents, network data collection and analysis model, protocol analysis model are discussed.
出处 《广西科学院学报》 2005年第4期232-235,共4页 Journal of Guangxi Academy of Sciences
基金 广西科技攻关项目(桂科攻0385001) 广西留学回国人员科学基金项目(桂科回0342001)联合资助
关键词 入侵检测系统 分布式 网络代理 代理 intrusion detection, system,distributed, network agent, agent
  • 相关文献

参考文献4

二级参考文献19

  • 1S R Snapp, S E Smaha, D M Teal et al. The DIDS (distributed intrusion detection system) prototype. In: USENIX Association.Proc of the Summer 1992 USENIX Conf. Berkeley, CA, USA:USENIX Association, 1992. 227--233.
  • 2S Staniford-Chen, S Cheung, R Crawford et al. GrlDS---A graph based intrusion detection system for large networks. The 19th National Information Systems Security Conference (NISSC),Baltimore, MD, USA, 1996. 1:361-370.
  • 3J S Balasubramaniyan, J O Garcia-Fernandez, D Lsaeoff et al.Architecture for intrusion detection using autonomous agents.COAST Laboratory, Purdue University, COAST Tech Rep: 98-05, 1998. http://www. cerias. purdue.edu/homes/aafid/docs/tr9805, pdf.
  • 4P A Porras, P G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. The 20th National Information Systems Security Conf(NISSC), Baltimore,MD, USA, 1997.353-365.
  • 5J Pickel, R Danyliw. Enabling automated detection of security events that affect multiple administrative domains.Information Networking Institute, Carnegie Mellon University, Pittsburgh,PA, USA, 2000. http://www. incident.org/thesis/bookl. html.
  • 6C Krugel, T Toth. Distributed pattern detection for intrusion detection. The Network and Distributed System Security Symposium Conf, San Diego, CA, USA, 2002.
  • 7S Staniford-Chen, B Tung, D Schnackenberg. The common intrusion detection framework (CIDF) . The 1st Information Survivability Workshop, Orlando, FL, USA, 1998.
  • 8T Bass. Intrusion detection systems and multisensor data fusion.Communications of the ACM, 2000, 43(4) : 99--105.
  • 9Intrusion Detection Working Group. The Intrusion Detection Exchange Protocol (IDXP) . 2002. http://www.ietf.org/internet-drafts/draft-ietf-idwg-beep-idxp-04, txt.
  • 10Intrusion Detection Working Group. Intrusion detection message exchange format data model and extensible markup language(XML) document type definition. 2001. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-06. txt.

共引文献38

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部