期刊文献+

新型分布式集成防御系统框架

New Frame of Distributed Integrated Defend System
下载PDF
导出
摘要 提出了基于消息和插件的防御框架模型。该模型采用数据融合、智能代理和抗毁设计来保证防御系统自身的高可靠性。测试结果表明模型可行且高效。 A new model based on message and plugin is brought up. It is to use data fusion, smart agent and resisting frame for keeping the high dependability of defend system. It' s proved by testing that this model is feasible and has high performalice.
出处 《计算机应用研究》 CSCD 北大核心 2006年第11期121-122,125,共3页 Application Research of Computers
基金 信产部生产发展基金资助项目(信运部[2002]546)
关键词 分布式 集成防御 智能代理 数据融合 抗毁框架 Distributed Integrated Defend Smart Agent Data Fusion Resisting Frame
  • 相关文献

参考文献7

  • 1Allen J, Christie A. State of Practice of Intrusion Detection Technologies[ R]. Technical Report CMU, 1999.
  • 2Janse W, Mell P. Applying Mobile Agents to Intrusion Detection and Response[ R]. NIST Interim Report( IR), 1999.
  • 3韩宏,卢显良.一种分布式入侵检测系统构架[J].计算机科学,2001,28(9):51-54. 被引量:11
  • 4姜建国,范晓岚.Cyber IDS——新一代的入侵检测系统[J].计算机工程与应用,2003,39(19):176-179. 被引量:4
  • 5Shao-chun Zhong, et al. A Safe Mobile Agent System for Distributed Intrusion Detection[ C]. Xi'an: Proceedings of the 2nd International Conference on Machine Learning and Cybernetics, 2003.
  • 6Jongwook Moon, et al. Accelerating Firewall Through Intelligent Self-Learning[ C]. Proc. of IEEE International Conference on System,Man and Cybernetics ,2003.
  • 7Robert Zalenski. Firewall Technologies[J]. IEEE, 2002, (2) :24-29.

二级参考文献13

  • 1[1]Allen J, Christie A. Sate of practice of intrusion detection technologies: [Technical report CMU/SEI-99-TR-028].1999
  • 2[2]Janse W, Mell P. Applying Mobile Agents to Intrusion Detection and Response: [NIST Interim Report(IR)-6415Oct]. 1999
  • 3[3]Paxson V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 1999,31(23-24):2435~2463
  • 4[4]Porras P A. Detecting Computer and Network Misuse Through the Production-based Expert System Toolset(P-Best). In:Proc. of 1999 IEEE Symposium on Security and Privacy, May 1999. 9~12
  • 5[5]Spafford E. An Architecture for Intrusion Detection Using Autonomous Agents: [COAST Technical report ]. June 1998
  • 6[6]Lee W. A Data Mining Framework for Building Intrusion Detection Models. In:Proc. of 1999 IEEE Symposium on Security and Privacy,May, 1999
  • 7[7]Jagannathan R. Lunt T. System Design Document:Next-Generation Intrusion Dectection Expert System(NIDES).System Design Document: A007, A012, A014 March 9,1993
  • 8[8]Ingram D J. Kremer H. Distributed Intrusion Detection for Computer Systems Using Communicating Agents. In:the Proc. of the 2000 Command and Control Research and Technology Symposium, June 2000
  • 9[9]Helemer G G.,Wong J S. K. Intelligent Agents for Intrusion Detection
  • 10[10]Libicki L. Defending Cyberspace and Other Metaphors

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部