期刊文献+

基于策略的分布式入侵检测系统的动态配置 被引量:1

Policy-based Configuration of Distributed IDS
下载PDF
导出
摘要 在分布式入侵检测系统中,随着使用的传感器数量的增加,手工配置组件的复杂度和费用也在不断提高,为解决这一问题,提出了一种基于策略的IDS组件配置方法,该方法使用了来自资源管理数据库和自学习传感器的额外信息,简化了策略设计,实现了分布式入侵检测系统的动态重配置。 In distributed IDS,with the number of the de- ployed sensors the complexity and cost of manual con- figuration of the components increase as well.To settle this question,this paper proposes a policy-based meth- od for the configuration of the IDS components.The method makes use of additional information which is col- lected from an asset management database(and maybe from the IDS sensors themselves).The process makes the design of policy easy and implements auto configura- tion of the distributed IDS.
出处 《计算机与数字工程》 2007年第1期100-102,112,共4页 Computer & Digital Engineering
关键词 入侵检测分布式入侵检测系统基于策略配置 自动配置 Intrusion Detection distributed IDS policy-based configuration autoconfiguration
  • 相关文献

参考文献5

  • 1Jai Sundar Balasubramaniyan,Jose Omar Garcia-Fernandes,David Isaco,Eugene Spafford,Diego Zamboni.An Architecture for Intrusion Detection using Autonomous Agents.COAST Technical Report 05-98,COAST Laboratory,Purdue University,1998.
  • 2Westerinen A,Schnizlein J.IETF RFC3189,Terminology for Policy Based Management[S],2001.
  • 3Rene W.Using a classification of management policies for policy specification and policy transformation[K].IFIP/IEEE.International Symposium on Integrated Network Management.Mass:Addison Wesley.1995.77 -52
  • 4李莉,任秀丽,栾贵兴.基于策略的分布式网络管理系统[J].东北大学学报(自然科学版),2002,23(6):515-518. 被引量:20
  • 5陈冬松,潘成胜,俞承志,王光兴.一种基于策略的配置管理思想[J].火力与指挥控制,2003,28(5):74-76. 被引量:3

二级参考文献10

  • 1Martin J P. A survey of distributed enterprise network and systems management[J]. Journal of Network and Systems Management,1999,7(1):9-26.
  • 2Martin J P, Znaty S. Annotated typology of distributed network management paradigms[R]. Lausanne:SCC Press,1997.
  • 3IS9595-2-1988,Common Management Information Service[S].
  • 4Galvin J M, McCloghrie K. Administrative model for version 2 of the simple network management protocol(SNMPv2)[R]. Reston: Internet Engineering Task Force,1993.
  • 5Jamie J,Michael J. Draft-ietf-ipsec-policy-schema-00.txt[EB/OL],http:∥www.ietf.org/proceedings/99jul/I-D/draft-ietf-ipsec-policy-schema-00.txt, 1999-05-24/1999-11-24.
  • 6Jamie J, Michael J. Policy framework [EB/OL]. http:∥www.ietf.org/html.charters/policy-charter.html,1999-01-10/2000-10-04.
  • 7Ncklisch J. A rule language for network policies[EB/OL]. http:∥www-dse.doc.ic.ac.uk/events/policy-99/pdf/26-Nicklisch.pdf, 1998-09-10/1999-10-10.
  • 8IBM Technical support. NetView for AIX Administrator′s Reference[R]. Armonk:IBM Corp,1994.
  • 9Rene W. Using a classification of management policies for policy specification and policy transformation[A]. IFIP/IEEE. International Symposium on Integrated Network Management[C]. Mass :Addison-Wesley,1995.77-52.
  • 10王平,李莉,赵宏.一种基于多级Manager/Agent结构的智能网络管理系统[J].东北大学学报(自然科学版),2001,22(6):604-607. 被引量:6

共引文献19

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部