期刊文献+

基于Agent的分布式入侵检测系统研究

Research of DIDS Based on Agents
下载PDF
导出
摘要 为了提高入侵检测系统在体系结构上的灵活性、提高入侵检测的速度,本文将Agent技术应用于入侵检测,探讨了基于Agent的入侵检测技术和模型。首先分析了网络安全及入侵检测系统的研究现状及发展趋势,以及入侵检测技术在网络安全中的重要地位和作用。在对入侵检测技术及Agent技术深入分析的基础之上,提出了一种基于Agent的入侵检测系统模型,研究了构成基本构架的各个子系统在整个模型中的作用及相互关系,给出了各自的设计实现方法,并重点讨论了基于Agent的分布式入侵检测系统模型的通信问题。 To enhance tbe flexibility of IDS architecture and detect intrusion effectively, we researched and applied the agent technology to the field of intrusion detection. Firstly,this paper discusses network security technology and basic concepts of intrusion detection including the necessity of and current situation and the development trend. Based on the in - depth analysis of intrusion detection and Agent technology, this article brings forward an Agent - based distributed intrusion detection sysem model and discusses the responsibility of each subsystem. Also, this paper discusses especially the communication problems of the Agent - based distributed intrusion detection system model.
作者 刘芳 郑义
出处 《现代电子技术》 2006年第23期51-53,共3页 Modern Electronics Technique
关键词 入侵检测 分布式 AGENT 多AGENT系统 intrusion detection, distributed Agent, multi - Agent system
  • 相关文献

参考文献4

  • 1张然,钱德沛,张文杰,刘轶,栾钟治.入侵检测技术研究综述[J].小型微型计算机系统,2003,24(7):1113-1118. 被引量:47
  • 2http://www,isi.edu/~brian/cidf/.
  • 3Xinzhou Qin,Wenke Lee,Lewis L,et al.Integrating Intrusion Detection and Network Management.Network Operations and Management Symposium,2002.NOMS 2002.2002 IEEE/IFI P,2002.
  • 4John McHugh.Intrusion and Intrusion Detection.International Journal of Information Security,2003.

二级参考文献11

  • 1Anderson J P. Computer security threat monitoring and surveillance [R]. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania, 1980. 4.
  • 2Dorothy E. Denning. An intousion-detedion model [J]. IEEE Transactions on Software Engineering, 1987, SE-13 (2), 222-232.
  • 3Fox K L, Henning R R. A neural network approach towards intrusion detection[C]. Washington DC: In Proceeding of 13^th National Computer Security Conference, 1990.
  • 4Bonifaco J M, Moreira E S. An adaptive intrusion detection system using neural network[M]. Brazil: UNESP, 1997.
  • 5Cannady J. Artifical neural network for misuse detection [C]. In Proceeding of the 1988 National Information Aystem Security Conference (NI-SSC' 98), 1998, 10: 5-- 8): 443-456.
  • 6Ludovic Me. Gassata. A genetic algorithm as an alternative tool for security audit trail analysis [R]. Cesson Sevigne Cedex,France: Superlec, 1996.
  • 7Crosbie M, Spafford G. Applying genetic programming to intrusion detection [R]. Purdus University : Department Computer Sciences, Coast Laboratory, 1997.
  • 8Steven A H. An immunological model of distributed detection and its application to computer security[D]. [s. 1. ] : University of New Mexico, 1999.
  • 9Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez,David Isacoff, Eugene Spafford, Diego Zamboni. An architecture for intrusion detection using autonomous agents [R]. CERIAS Technical Report 98/05, June 11,1998.
  • 10Forrest S, Hofmeyr S A ,and Somayaji A. Computer immunology[J]. Communications of the ACM,1997,40(10) :88-96.

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部