期刊文献+

移动代理入侵检测系统中的自适应技术的研究 被引量:1

Research on Adaptive Technique of Intrusion Detection and System Based on Mobile Agent
下载PDF
导出
摘要 介绍了入侵检测及入侵响应系统中的自适应技术。提出了基于代理的自适应分层入侵检测系统(AAHIDS,Agent-based Adaptive Hierarchical Intrusion Detection System)和基于代理的自适应入侵响应系统(AIRS,Agent-based AdaptiveIntrusion Response System)。它们通过调整负责检测入侵行为的系统资源来实现自适应性,动态调用新的底层检测代理的组合以及调整与这些底层代理相关的置信度来适应变化的环境。通过增加过去已获得成功的响应机制的权值,使成功的响应机制获得更多的调用机会来实现响应的自适应性。 It introduces adaptation in intrusion detection and intrusion response. An agent- based adaptive hierarchical intrusion detection system (AAHIDS) and agent- based adaptive intrusion response system (AAIRS) are brought forth. They adjust the system resource used to detect intrusion action to realize adaptation, adapt to the variant circumstance by invoking new combination of low level detection agent dynamic and adjusting the confidence metric of these low level agent. Finally they increase the weight of the successful response, which make the response get more chance to be called to realize the adaptation of the response system.
出处 《计算机技术与发展》 2006年第2期229-231,234,共4页 Computer Technology and Development
基金 国家自然科学基金(60173037 70271050) 江苏省自然科学基金(BK2005146) 江苏省自然科学基金预研项目(BK2004218) 江苏省高技术研究计划(BG2004004 BG2005037) 国家"八六三"高科技项目(2005AA775050) 江苏省计算机信息处理技术重点实验室基金(kjs050001)
关键词 入侵检测 入侵响应 移动代理 自适应 intrusion detection intrusion response mobile agent adaptive
  • 相关文献

参考文献4

二级参考文献24

  • 1[1]Chess D. Security Issues in mobile code systems. In: Giovanni Vigna ed. Mobile Agent Security,1998. 1~14
  • 2[2]Karnik N M, Tripathi A R. Design issues in mobile Agent programming systems. IEEE Concurrency, 1998, 6(3): 52~61
  • 3[3]Uwe G Wilhelm, Sebastian M Saamann, Levente Buttyan. A pessimistic approach to trust in mobile Agent platforms. IEEE Computing , 2000,4(5): 40~48
  • 4[4]Vu Anh Pham, Ahmed Karmouch. Mobile software Agent. IEEE Communication Magazine, 1998,36(7): 26~37
  • 5[5]Michael S.Greenberg,Byington J.C. Mobile Agents and security. IEEE Communication Magazine, 1998,36(7): 76~85
  • 6[6]Martin Schaaf, Frank Maure. Integrating Java and CORBA:A programmer's perspective. IEEE Internet Computing, 2001,5(1): 72~78
  • 7[7]Farmer W M, Gutman J D, Swarup V. Security for mobile Agents: Authentication and state appraisal. In: Proceedings of the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18~130
  • 8[8]Bruce Eckel. Thinking in Java. 2nd Edition, Release 11. New Jersey: Prentice-Hall, 2000
  • 9[9]Davies W, Price W L. Security for Computer Networks. Chichesfer: John Wiley & Sons, 1989
  • 10[10]Pfleeger C P. Security in Computing. 2nd Edition. Upper Saddle River, New Jersey: Prentice Hall, 1997

共引文献129

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部