期刊文献+

基于Agent的内网安全系统研究 被引量:4

The Research of an Agent-Based Internal Network Security System
下载PDF
导出
摘要 针对目前分散式安全服务的种种弊端,通过将多Agent系统的多种特性引入网络安全系统,提出了一种基于网络拓扑结构感应能力以及行为自主性的多Agent融合方法的网络安全系统模型.以身份认证、访问控制、漏洞检测、安全审计等网络安全业务设计和实现了多种类型Agent,使网络安全系统提高了适应性能力等特征.通过自保护检测服务,确保Agent的安全通信及平台的顺利实施.该系统能有效地实施上述安全任务,提高网络安全;并能充分利用现有设备,实施廉价,可扩展性好. Aiming to the abuses of current distributed .security services, this paper applies the characteristics of multi-agent system to the network .security system, and proposes a model based on the convergent method which has the induction ability of network construction and behavior independence. The system designs and implements several kinds of agents with user authentication, network access control, vulnerability detection and secure auditing; increases the adaptability and other characteristics of network security system. Through the self-prevention detection service, the system guarantees the secure communications among the agents and the ,smooth platform deployment. The system can effectively implement above security tasks, increase the security of the internal network; thus is high efficiency, scalable and open.
出处 《微电子学与计算机》 CSCD 北大核心 2008年第5期1-5,共5页 Microelectronics & Computer
基金 国家自然科学基金项目(60174039)
关键词 网络安全 软件智能体 自保护检测服务 移动安全智能体 network security software agents self-prevention detection service mobile security agent
  • 相关文献

参考文献6

  • 1Cisoo Systems, Inc. Cisco NAC the development of the self- defending network [ EB/OL ]. [ 2007 - 01 - 10 ]. http:// www. cisoo.com.
  • 2Helmer G, Wong S K, Vasant H, et al. Lightweight agents for intrusion detection [ J ]. The Journal of Systems and Software, 2003(67) : 109 - 122.
  • 3Critchlow D, Zhang N. Security enhanced accountable anonymous PKI certificates for mobile e-commerce [ J ]. Computer Networks, 2004, 45(4): 483- 503.
  • 4杜春燕,黄宪,陆建德.一种改进的基于PKI/ECC的IKE协议设计[J].微电子学与计算机,2006,23(5):72-75. 被引量:4
  • 5De Vivo M, Carrasco E, Isem G, et al. A review of port scanning techniques[J].Computer Communications, 1999, 29(2):41-48.
  • 6陈辉,陶洋.基于WinPcap实现对ARP欺骗的检测和恢复[J].计算机应用,2004,24(10):67-68. 被引量:22

二级参考文献9

  • 1Atkins D 严伟等译.Internet网络安全专业参考手册[M].北京:机械工业出版社,1998..
  • 2[1]COMER DE.用TCP/IP进行网络互联,第一卷:原理、协议与结构第四版[M].北京:电子工业出版社,2001.53-59.
  • 3[2]STEVENS WR.TCP/IP协议详解,卷1:协议[M].北京:机械工业出版社,2001.
  • 4[5]http://winpcap.polito.it[EB/OL].2004.
  • 5Robert Zuccherato.Using A PKI Based Upon Elliptic Curve Cryptography.http://www.entrust.com.2003
  • 6Hemi Trickey and Alvin Barshefsky.An Access Control Architecture for Managing Large-Scale Network Applications.Bell Labs Technical Journal,2004,8(4)
  • 7Harkins D,Carrel D.The Internet Key Exchange (IKE).RFC2409,1998
  • 8Brian Korver.The Internet IP Security PKI Profile of IKE/ISAKMP and PKIX.draft-ietf-IPsec-pki-profile-04.txt.IETF Internet Draft,February 2004
  • 9S Farrell.An Internet Attribute Certificate Profile for Authorization.RFC3281,2002

共引文献24

同被引文献21

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部