期刊文献+

基于对等网的分布式入侵检测系统 被引量:1

Distributed intrusion detection system based on peer to peer
下载PDF
导出
摘要 分析了当前入侵检测分布化的特点,通过对等网原理的阐述、以及它和C/S模式之间差别的分析,同时为了实现入侵检测信息的共享,在各个分布式的入侵检测系统各独立的子系统之间进行了对等的网络连接,并在现有通用的入侵检测系统的框架的基础上提出了基于P2P协同的分布式入侵检测系统,从整个入侵系统框架角度,给出了分布式入侵检测系统各个组成模块的实现方法,尤其是对系统的数据通信模块进行了详细的阐述,并进行了功能分析。 The characteristics of distributed intrusion is illustrated by the thesis, the concept about P2P is introduced, including the growing applications, development status and differences between P2P and C/S. Each subsystem of IDS are connected by P2P in order to share in intrusion message. On the basis of the common inlxusion detection framework architecture, a new distributed IDS model is put forward and their functional modules are designed, especially, commtmication module of IDS are introduced in detail.
作者 阳波 陈蜀宇
出处 《计算机工程与设计》 CSCD 北大核心 2007年第15期3585-3587,3597,共4页 Computer Engineering and Design
基金 教育部"新世纪优秀人才支持计划"基金项目(NCET-04-0843)
关键词 网络安全 入侵检测 对等网 通信模块 信息交换格式 network security intrusion detection P2P communication module message exchange format
  • 相关文献

参考文献8

  • 1连一峰,戴英侠,胡艳,许一凡.分布式入侵检测模型研究[J].计算机研究与发展,2003,40(8):1195-1202. 被引量:36
  • 2Daniel Brookshier. Java P2P programming [M]. America: Published by Pearson Education,2002.
  • 3Yang Xin.Alerts management in distributed cooperative intrusion detection system[D].Beijing: Graduate School of Chinese Academy of Sciences,2003.
  • 4经小川,胡昌振,谭惠民.网络协同攻击及其检测方法研究[J].计算机应用,2004,24(11):25-27. 被引量:10
  • 5候孟书.基于P2P的分布式存储及相关技术研究[D].成都:电子科技大学,2005.
  • 6Rafeeq Ur Rehman. Intrusion detection systems with Snort[M]. New Jersey: Prentice Hall,2005.
  • 7ZHOU Lei. Research and implementation of distributed network intrusion detection system[D]. Jilin: Jilin University,2005.
  • 8DENG Xiao-ling. The research and application of P2P technology based on JXTA[D].Beijing: Beijing University of Technology,2003.

二级参考文献16

  • 1[1]GREEN J,MARCHETTE D,NORTHCUTT S.Analysis Techniques for Detecting Coordinated Attacks and Probes [ EB/OL].http:∥www.blacksheepnetworks.com/security/info/misc/coord.html,2004.
  • 2[2]ECKMANN ST,VIGNA G,KEMMERER PA.Statl:An attack language for state-based intrusion detection[ A].Proceedings of the ACM Working on Intrusion Detection[ C].2000.
  • 3[3]PENG N.Abstraction-based Intrusion Detection in Distributed Environments[D].George Mason University,2001.
  • 4[4]BRO PV.A system for detecting network intruders in real-time [A].Proceedings of the 7th Usenix Security Symposium[ C].1998.
  • 5S R Snapp, S E Smaha, D M Teal et al. The DIDS (distributed intrusion detection system) prototype. In: USENIX Association.Proc of the Summer 1992 USENIX Conf. Berkeley, CA, USA:USENIX Association, 1992. 227--233.
  • 6S Staniford-Chen, S Cheung, R Crawford et al. GrlDS---A graph based intrusion detection system for large networks. The 19th National Information Systems Security Conference (NISSC),Baltimore, MD, USA, 1996. 1:361-370.
  • 7J S Balasubramaniyan, J O Garcia-Fernandez, D Lsaeoff et al.Architecture for intrusion detection using autonomous agents.COAST Laboratory, Purdue University, COAST Tech Rep: 98-05, 1998. http://www. cerias. purdue.edu/homes/aafid/docs/tr9805, pdf.
  • 8P A Porras, P G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. The 20th National Information Systems Security Conf(NISSC), Baltimore,MD, USA, 1997.353-365.
  • 9J Pickel, R Danyliw. Enabling automated detection of security events that affect multiple administrative domains.Information Networking Institute, Carnegie Mellon University, Pittsburgh,PA, USA, 2000. http://www. incident.org/thesis/bookl. html.
  • 10C Krugel, T Toth. Distributed pattern detection for intrusion detection. The Network and Distributed System Security Symposium Conf, San Diego, CA, USA, 2002.

共引文献43

同被引文献7

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部