期刊文献+

Agent技术在分布式入侵检测系统的应用研究 被引量:3

Application of agent in distributed intrusion detection system
下载PDF
导出
摘要 剖析了现有的分布式入侵检测系统及其在网络中的优势,将代理(agent)技术应用到分布式入侵检测系统中,并在此基础上提出了一种基于agent的分布式入侵检测系统(agent-based distributed intrusion detectionsystem,ADIDS)的新模型。ADIDS采取无控制中心的多agent结构,充分利用agent本身的独立性与自主性,尽量降低各检测部件间的相关性,避免了单个中心分析器带来的单点失效问题。各个数据采集部件、检测部件都是独立的单元,不仅实现了数据收集的分布化,而且将入侵检测和实时响应分布化,提高了系统的健壮性,真正实现了分布式检测的思想。 The inspiration was drawed from distributed intrusion detection system and agent technology, a novel agent-based distributed intrusion detection system(ADIDS) model was put forward and deeply researched to improve the detection capability of current network intrusion detection systems. In order to reduce the relevance of each detection components as far as possible, and avoid the simple point failure caused by the single central analyzer, the ADIDS model adopted the non-control center multi-agent, which used fully the independence agent. All of the ADIDS components were the independent unit, which had realized the distributing data collection and the real-time response. Thus the robustness of the entire system is enhanced, and the distributing detection is truly realized
出处 《计算机应用研究》 CSCD 北大核心 2008年第4期1127-1129,共3页 Application Research of Computers
基金 国家“十五”重大科技攻关项目(2004BA616A-11-03)
关键词 信息安全 入侵检测 代理 代理技术 分布式 information security intrusion detection agent agent technique distributed
  • 相关文献

参考文献9

  • 1HUANG M Y, ROBERT J, THOMAS M, A large scale distributed intrusion detection framework based on attack strategy analysis [ J ], Computer Networks, 1999,31:2465-2475.
  • 2SNAPP S R, BRETANO J, DIAZ G V,et al. DIDS motivation archi- tecture and an early prototype[ C]//Proc of the 14th National Computer Security Conference. Washington DC:[ s. n. ] ,1999:67-76.
  • 3JACKSON K A. NADIR: a prototype system for detecting network and file system abuse[ C ]//Proc of the 7th European Conference on Information Systems. 1992.
  • 4HABRA N, CHARLIER L B, MOUNJI A, et aL ASAX: software architecture and rule-based language for universal audit trail analysis[C ]//Proc of the 2nd European Symposium on Research in Computer Security( ESORICS' 92). Toulouse, France: [ s. n. ], 1992: 435- 450,
  • 5ABRAHAM A, JAIN R, THOMAS J, et al. D-SCIDS: distributed soft computing intrusion detection system [ J]. Journal of Network and Computer Applications,2005,6:1 - 19.
  • 6ABRAHAM A, THOMAS J. Distributed intrusion detection systems: a computational intelligence approach [ C ]//ABBASS H A, ESSAM D. Applications of Information Systems to Homeland Security and Defense. USA : Idea Group Inc Publishers,2005 : 105 - 135.
  • 7SPAFFORD E H, ZAMBONI D. Intrusion detection using autonomous agents[J].Computer Networks,2000, 34:547-570.
  • 8ZAKI M, TAREK S S. Attack abstraction using a multi-agent system for intrusion detection [ J ]. doumal of Intelligent & Fuzzy Systems, 2005, 16:141-150.
  • 9DASGUPTA D, GONZALEZ F, YALLAPU K, et al. CIDS : an agent-based intrusion detection system[ J ]. Computers & Security, 2005, 24:387-398.

同被引文献27

  • 1李荣鑫.基于智能代理的分布式入侵检测系统模型[J].微计算机信息,2008,24(6):72-73. 被引量:7
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 3曾广平,涂序彦.“软件人”的概念模型与构造特征[J].计算机科学,2005,32(5):135-136. 被引量:19
  • 4阳凌怡,陈建华,张丽娜.移动代理在入侵检测中的安全性分析与研究[J].计算机工程,2007,33(2):114-116. 被引量:5
  • 5叶明江,崔勇,徐恪,吴建平.基于有状态Bloom filter引擎的高速分组检测[J].软件学报,2007,18(1):117-126. 被引量:13
  • 6JIANG W B, SONG H, DAI Y Q. Real-time intrusion detection for high-speed networks [ J ]. Computers & Security, 2005,24 ( 4 ) : 287-294.
  • 7BOUKERCHE A,MACHADO R B,JUCA'K R,et al. An agent-based and biological inspired real-time intrusion detection and security model for computer network operations [ J ]. Computer Communicalions, 2007,30 ( 13 ) : 2649-2660.
  • 8TU Xu-yan,ZENG Guang-ping, TANG Tao. HADS : humanized autonomous decentralized systems [ C ]//Proc of International Symposium on Autonomous Decentralized Systems ( ISADS' 2005 ). 2005:593-598.
  • 9PANG Jie, NING Shu-rong, LI Gui-zhi, et al. Research on scheduling in multi-softman system with the learning mode based on genetic algorithms[ C]//Proc of International Conference on Networking, Sensing and Control (ICNSC ' 2006 ). Ft. Lauderdale, FL: [ s. n. ], 2006: 1026-1029.
  • 10FUCHSBERGER A. Intrusion detection systems and intrusion prevention systems [ R]. Information Security Technical Report , 2005 :134- 139.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部