期刊文献+

基于多检测技术的入侵检测系统模型 被引量:1

Intrusion detection system model based on multi detection technology
下载PDF
导出
摘要 针对当前入侵检测系统和入侵检测分析方法的弱点,提出了一个融合多检测技术的基于Multi-Agent的分布式入侵检测系统模型,采用了基于移动Agent的文件完整性检测技术。该模型实现了入侵检测的分布化,具有很好的扩充性,增强了入侵检测的准确率,提高了入侵检测系统的性能,能更好地满足大规模分布式网络环境的安全要求。 In view of the weakness of current intrusion detection system and intrusion analysis method, a distributed fusing multi detection technology intrusion detection system model based on multi-Agent is brought forward. Apart from traditional analysis technology, file integrity analysis method based on mobile agent is added to the analysis Agent too. The model realizes the distribution of intrusion detection, owns good scalability, improves the accuracy of intrusion detection, enhances the intrusion detection system's capability by using multi detection technology. So it can meet extensive security demand of the distributed network environment.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第7期1633-1635,1646,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2002AA113160、2003AA1Z2290、2004AA1Z2130)
关键词 入侵检测 多代理 多检测技术 分布式入侵检测系统 文件完整性检测 intrusiondetection multi-Agent multi detection technology distributed intrusion detection system file integritydetection
  • 相关文献

参考文献5

二级参考文献14

  • 1J Hockberg.NADIR:An Automated System for Detecting Network Intrusion and Misuse[J].Computers and Security, 1993; 12(3) :235-248.
  • 2James Cannady,James Mahaffey.The Application of Artificial Neural Networks to Misuse Detection : Initial Results[C].In :Proceedings of First International Workshop on the Recent Advances in Intrusion Detection, 1998-09.
  • 3J S Balasubram,J O Garcia-Fernandez,D Isacoff et al.An Architec ture for Intrusion Detection Using Autonomous agents[C].In :Computer Security Applications Conference, 1998 Proceedings, 14th Annual, 1998: 13-24.
  • 4Ragsdale Daniel J,Carver Curtis A Jr,Humphries Jeffrey W et al. Adaptation techniques for intrusion detection and intrusion response systems[C].In :Proceedings of the IEEE International Conference on Systems,Man and Cybernetics 4,2000-10.
  • 5Gene H Spafford,Eugene H.The Design and Implementation of Tripwire:A File System Integrity Checker[C].In:Proceedings of the ACM Conference on Computer and Communications Security, 1994-11:18.
  • 6[美]BaseRG陈明奇译.入侵检测[M].北京:人民邮电出版社,1998..
  • 7戴英侠 连一峰 王航.系统安全与入侵检测[M].北京:清华大学出版社,2001..
  • 8蒋建春 冯登国.网络入侵检测原理与技术[M].北京:国防工业出版社,2000..
  • 9Chen S,Tung B,Schnachenberg D. The Common Intrusion Detection Framework Data Formats [EB/OL].Draft Drafi-ietf-data-formats-oo.text 1998.
  • 10Amoroson E G. Fundamentals of Computer Security Technology [M] .US: Prence Hall, 1994.

共引文献6

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部