期刊文献+

An Useful Communication Mechanism for Distributed Agents-Based Intrusion Detection System

An Useful Communication Mechanism for Distributed Agents-Based Intrusion Detection System
下载PDF
导出
摘要 The communication mechanism plays an important role in an intrusion detection system, while it has not been paid enough attention. Based on analyzing the actual facts and expatiating upon the requirements a communication mechanism needs to meet, a message driven communication mechanism is proposed in this paper. The protocol presented here is divided into three layers: entity level, host level, and network level. The communication processes are also designed in detail. Experiments illustrate that cooperative entities can detect distributed sophisticated attacks accurately. Furthermore, this mechanism has the advantages like high reliability, low time delay and expenses. The communication mechanism plays an important role in an intrusion detection system, while it has not been paid enough attention. Based on analyzing the actual facts and expatiating upon the requirements a communication mechanism needs to meet, a message driven communication mechanism is proposed in this paper. The protocol presented here is divided into three layers: entity level, host level, and network level. The communication processes are also designed in detail. Experiments illustrate that cooperative entities can detect distributed sophisticated attacks accurately. Furthermore, this mechanism has the advantages like high reliability, low time delay and expenses.
作者 DU Ye
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1801-1804,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the Science and Technique Founda-tion of Beijing Jiaotong University (2006RC012)
关键词 COMMUNICATION intrusion detection system COOPERATION MODEL PROTOCOL communication intrusion detection system cooperation model protocol
  • 相关文献

参考文献10

  • 1Neumann P,Porras P.Experience with EMERALDto Date[].Proceedings of the Workshop on Intrusion Detection and Network Monitoring.1999
  • 2Debar H,Curry D,Feinstein B.The Intrusion Detection Message Exchange Format [ EB/OL][].ht- tp:// www ietforg/ proceedings/nov/IDs/draft-ietf- idwg-idmef-xml-txt.2005
  • 3Spafford E,Zamboni D.Intrusion detection using autonomous agents[].Computer Networks.2000
  • 4Vigna G,Kemmerer R.NetSTAT: A Network-based Intrusion Detection System[].Journal of ComputerSecurity.1999
  • 5FIPA.ACL message structure specification. http://www.fipa.org/specs/fipa00061/SC00061G.pdf . 2005
  • 6Peddireddy T D,Vidal J M.Multiagent network security system using FIPA-OS[].Proceedings of the second international joint conference on autonomous agents and multiagent systems.2003
  • 7The Intrusion Detection Exchange Protocol(IDXP). draft-i-etf-idwg-beep-idxp-07[S/OL] . 2005
  • 8D.Schnackenberg,,K.Djahandari.Infrastructure for Intrusion Detection and Response[].Proceeding of the DARPA Information Survivability Conference and Exposition.2000
  • 9Ye,Du,Huiqiang,Wang,Yonggang,Pang. A Useful System Prototype for Intrusion Detection Architecture and Experiments [C]//Proceedings of International Conference on Discovery Science 2004 . 2004
  • 10Du Ye,Wang Hui-qiang,Pang Yong-gang.Design of a distributed intrusion detection system based on independent agents[].Proceedings of IEEE International Conference on In-telligent Sensing and Information Processing.2004

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部