期刊文献+

基于CSCW的分布式入侵检测模型研究

A Model Research of Distributed Intrusion Detection Based on CSCW
下载PDF
导出
摘要 分布式入侵检测技术是目前安全检测领域的研究热点之一。在分析了现有分布式入侵检测系统所存在问题的基础之上,基于CSCW的原理,提出了一种新的分布式入侵检测系统模型。该系统模型采用CSCW概念重新构造系统的检测组件,通过协同机制和安全通信,实现了分布式入侵检测系统各个检测组件之间的数据共享、知识共享和负载均衡,解决了分布式系统检测组件之间缺乏有效协作和信息共享的问题,避免了关键节点的处理瓶颈,提高了系统的协同检测能力和资源利用率。 Distributed intrusion detection is one of the hotspots of security detection field nowadays. Based on the analysis of the existing problems of current distributed intrusion detection system and the principle of CSCW, a kind of new distributed intrusion detection model is proposed. The components of the model are newly created using CSCW concept. By cooperation mechanism and security communication, the model actualizes data share, knowledge share and load balancing among components of distributed intrusion detection system, avoids disposal bottle- neck of critical nodes, and improves the ability of cooperative detection and the availability of system resources.
出处 《计算机技术与发展》 2008年第5期150-152,175,共4页 Computer Technology and Development
基金 广东省自然科学基金项目(06021484)
关键词 计算机支持的协同工作 分布式入侵检测 信息共享 协同分析 CSCW distributed intrusion detection information share cooperation analysis
  • 相关文献

参考文献6

  • 1连一峰,戴英侠,胡艳,许一凡.分布式入侵检测模型研究[J].计算机研究与发展,2003,40(8):1195-1202. 被引量:36
  • 2Dong Y- L,Qian J ,Shi M - L. A cooperative intrusion detection system based on automous agents[C]//CCECE' 2003. Montreal:[s. n. ] ,2003:861 - 864.
  • 3史美林,董永乐.钱俊,等.CSCW支持下的协同入侵检测[C]//第三届全国CSCW暨第一届全国AIN学术会议论文集,呼和浩特:[出版者不详].2002:9-14.
  • 4Atam M S,Javed Q. Adaptive load balancing architecture for SNORT[ C]//INCC 2004. Lahore, Pakistan: [ s. n. ], 2004: 48 - 52.
  • 5The Intrusion Detection Message Exchange Format, draft- ieft- idwg- id - reef- xml-12[S/OL]. 2005-04. http://www. ietf. org.
  • 6The Intrusion Detection Exchange Protocol ( IDXP), draft - ieft- idwg- beep - idxp - 07 [ S/OL]. 2005 - 04. http:// www. ietf. org.

二级参考文献12

  • 1S R Snapp, S E Smaha, D M Teal et al. The DIDS (distributed intrusion detection system) prototype. In: USENIX Association.Proc of the Summer 1992 USENIX Conf. Berkeley, CA, USA:USENIX Association, 1992. 227--233.
  • 2S Staniford-Chen, S Cheung, R Crawford et al. GrlDS---A graph based intrusion detection system for large networks. The 19th National Information Systems Security Conference (NISSC),Baltimore, MD, USA, 1996. 1:361-370.
  • 3J S Balasubramaniyan, J O Garcia-Fernandez, D Lsaeoff et al.Architecture for intrusion detection using autonomous agents.COAST Laboratory, Purdue University, COAST Tech Rep: 98-05, 1998. http://www. cerias. purdue.edu/homes/aafid/docs/tr9805, pdf.
  • 4P A Porras, P G Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. The 20th National Information Systems Security Conf(NISSC), Baltimore,MD, USA, 1997.353-365.
  • 5J Pickel, R Danyliw. Enabling automated detection of security events that affect multiple administrative domains.Information Networking Institute, Carnegie Mellon University, Pittsburgh,PA, USA, 2000. http://www. incident.org/thesis/bookl. html.
  • 6C Krugel, T Toth. Distributed pattern detection for intrusion detection. The Network and Distributed System Security Symposium Conf, San Diego, CA, USA, 2002.
  • 7S Staniford-Chen, B Tung, D Schnackenberg. The common intrusion detection framework (CIDF) . The 1st Information Survivability Workshop, Orlando, FL, USA, 1998.
  • 8T Bass. Intrusion detection systems and multisensor data fusion.Communications of the ACM, 2000, 43(4) : 99--105.
  • 9Intrusion Detection Working Group. The Intrusion Detection Exchange Protocol (IDXP) . 2002. http://www.ietf.org/internet-drafts/draft-ietf-idwg-beep-idxp-04, txt.
  • 10Intrusion Detection Working Group. Intrusion detection message exchange format data model and extensible markup language(XML) document type definition. 2001. http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-06. txt.

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部