期刊文献+

一种基于环形协作算法的分布式入侵检测模型

A model of the distributed intrusion detection based on the ring collaboration arithmetic
下载PDF
导出
摘要 文章分析了当前流行的分布式入侵检测系统的特征以及协作方式,提出了一种基于逻辑环形协作算法的分布式入侵检测系统,以解决目前分布式入侵检测系统中各系统间协作效率低、检测响应慢的缺陷。 Through analyzing the characteristics of the present distributed intrusion detection system and the cooperating mode, this article proposes a set of Distributed Intrusion Detection System (DIDS) based on the logical ring of collaboration arithmetic distributed cooperating control technology, which is able to overcome some shortcomings of the present DIDS such as the low cooperation efficiency and the slowness of the detecting response and so on.
作者 江文 姜华斌
出处 《电脑与信息技术》 2006年第3期68-72,共5页 Computer and Information Technology
关键词 分布式入侵检测 环形协作控制 公用入侵检测框架 distributed intrusion detection ring cooperation control common intrusion detection framework
  • 相关文献

参考文献10

  • 1James P.Anderson.Computer Security ThreadMonitoring and Surveillance[R].Washington,Pennsylvania,1980.
  • 2Chen S,Tung B,Schnackenberg D.The Common Intrusion Detection Framework-data formats[EB/OL].Internet Draft Draft-ietf-cidf-data-formats-00.Txt,1998.
  • 3Tim mis J,Knight T.Artificial immune system:Using the immune system as inspiration for data mining[A].Data Mining:.A Heuristic Approach[C].2001:209-230.
  • 4Nolfi S,Florano F.Learning and Evolution[J].Autonomous Robots,1999,7(1):89-113.
  • 5Polla D,McConnell J,Johnson T,et al.A Framework for Cooperative Intrusion Dection[C].21st National Information Systims Security Conferedcd,October 1998:361-373.
  • 6Janakiraman R,Waldvogel M,Zhang Q.A Peer-to-Peer Approach to Network Intrusion Detection And Prevention[C].Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security,Linz,Austria,June 2003.
  • 7NING P,WANG X,JAJODIA S.Modeling requests among cooperating intrusion detection system[J].Computer Communications,2002,23(7):702-1715.
  • 8马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 9SPAFFORD E H,ZAMBONI D.Intrusion detection using autonomous agents[J].Computer Networks,2000,34:547-570.
  • 10李旺,吴礼发,胡谷雨.分布式网络入侵检测系统NetNumen的设计与实现[J].软件学报,2002,13(8):1723-1728. 被引量:31

二级参考文献11

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8[1]Allen, J., Christie, A., Fithen, W., et al. State of the practice of intrusion detection technologies. CMU/SEI-99-TR-028, 2000. http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028abstract.html.
  • 9[2]Stevens, W.R. Unix Network Programming (Vol.1) Networking APIs: Sockets and XTI(2nd ed.). Prentice Hall PTR., 1998.
  • 10[3]Roesch, M. Snort-Lightweight Intrusion Detection for Networks. In: Proceedings of the USENIX LISA'99 Conference. http://www.usenix.org/events/lisa99/full_papers/roesch/roesch.pdf

共引文献148

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部