期刊文献+

基于移动Agent的分布式入侵检测系统设计研究

Design Research on Distributed Intrusion Detection System Based on Mobile-agent
下载PDF
导出
摘要 传统集中式入侵检测模型和系统存在诸多问题,无法适应分布式网络环境发展的需要,而利用移动Agent技术改进的入侵检测系统和解决方案则显示了其性能优势。从总结传统集中式的入侵检测模型和系统存在的问题出发,分析了分布式入侵检测系统中应用移动Agent的技术,设计了一种基于移动Agent的分布式入侵检测系统,并对系统进行了实例检测,验证了系统的可用性和有效性。 The existence of problems in traditional focused intrusion detection model and system make the unsuitable situations in the demands on development of distributed network environment. And the intrusion detection system(IDS) and solving scheme which use the technique of mobile-agent indicate their high performance. The problems of traditional IDS, is first summarized and analyzed the techniques of mobile-agent on IDS, also designed one type of distributed intrusion detection system based on mobile-agent, then made some implementations and validates the usability and validity on performance of the system.
作者 张乐 苏秀琴
出处 《科学技术与工程》 2007年第19期5150-5154,5179,共6页 Science Technology and Engineering
关键词 入侵检测系统 移动AGENT AGENT通信语言 网络安全 intrusion detection system mobile-agent agent communication language network security
  • 相关文献

参考文献5

  • 1董晓梅,于戈.分布式入侵检测与响应协作模型研究[J].计算机工程,2006,32(6):151-153. 被引量:11
  • 2[3]Jones A K,Sielken R S.Computer system intrusion detection:a survey.University of Virginia,USA,2002:19-20
  • 3[4]Ferrari L.Aglets:Aglets Software Development Kit; http://www.trl.ibm.com/aglets/2004
  • 4[5]OMG.MASIF The OMG Mobile Agent System Interoperability Facility; www.hpl.hp.com/personal/Dejan_Milojicic/ma4.pdf.1998
  • 5[6]Labrou Y,Finin T.UMBC AgentWeb KQML http://ww.cs.umbc.edu/kqml,2000

二级参考文献6

  • 1Spafford E H,Zamboni D.Intrusion Detection Using Autonomous Agents[J].Computer Networks,2000,34(4):547-570.
  • 2Porras P,Schnackenberg D,Staniford-Chen S,et al.The Common Intrusion Detection Framework Architecture[EB/OL].http://www.isi.edu/gost/cidf/drafts/architecture.txt,1999.
  • 3IETF.Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition[EB/OL].http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-10.txt,2003.
  • 4Pal P,Webber F,Schantz R E,et al.Survival by Defense-enabling[C].Proceedings of the New Security Paradigms Workshop.New York:ACM Press,2001:71-78.
  • 5World Wide Web Consortium.SOAP 1.1[EB/OL].http://www.w3.org/TR/#Notes.2001.
  • 6杨海松,李津生,洪佩琳.分布开放式的入侵检测与响应架构——IDRA[J].计算机学报,2003,26(9):1177-1182. 被引量:17

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部