期刊文献+

一种基于对等模型的网络入侵检测系统模型 被引量:2

A Distributed Intrusion Detection System Based on Peer-to-Peer Model
下载PDF
导出
摘要 基于对等模型(Peer-to-Peer)的应用,提出一种分布式网络入侵检测系统:PeerIDS。该系统在设计上注重可靠性,且没有诸如单点失效一类的问题。入侵检测工作在由多台运行PeerIDS系统的连网计算机构成的对等网中随具体环境而自动进行迁移,以实现公平高效的分布式处理。同时,应用对等模型带来的可扩展性,使得该系统的性能可以通过简单地在网络中增加运行PeerIDS的计算机数目来不断提高,很好地适应了日益严峻的网络安全状况。在完成初始设置后,PeerIDS系统的运行几乎不需要任何使用者的干预,体现了很好的自治性。 By enaploying the peer- to- peer(P2P)rnodel,whieh is considered a promising approach to solve many problems in a distributed environment, presented a distributed network intrusion detection system named PeerlDS:an IDS solution values the properties of feasibility,durability and scalability most. Viewing the problam from a different pempective as against its counterparts,PeerlDS will provide the networked computation environment with robust and scalable protection while still stays efficient with the bumting of both types and traffic of malicious attacks through automatically and evenly distribute the intrusion detection workload anaong all the cooperating PeerlDS instances. Compared with many other distributed intrusion detection approaches,no single point of failure can be found in afoma of synergized PeerIDS instances. Moreover, PeerIDS entails almost no additional administration work after the installation and first time setup.
作者 李兵
出处 《计算机技术与发展》 2008年第3期173-176,共4页 Computer Technology and Development
基金 国家自然科学基金资助(60673165) 湖南省自然科学基金资助(05JJ30119) 湖南省科技计划项目(2006JT1040)
关键词 对等模型 网络入侵检测 分布式 peer- to- peer net intrusion detection system distributed system
  • 相关文献

参考文献4

二级参考文献46

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2Debar H,Dacier M,Wespi A.Towards a taxonomy of intrusiondetection systems.Computer Networks,1999,31(8):805~822
  • 3Ilgun K,Kemmerer R A,Porras P A.State transition analysis:a rule-based intrusion detection approach.IEEE Transactions on Software Engineering,1995,21(3):181~199
  • 4Ko C,Ruschitzka M,Levitt K.Execution monitoring of securitycritical programs in distributed systems:A specification-based approach.In:IEEE.PROC IEEE COMPUT SOC SYMP RES SECUR PRIVACY.PISCATAWAY,NJ,(USA),1997.175~187
  • 5Hofmeyr S,Forrest S,Somayaji A.Intrusion detection using sequences of system calls.Journal of Computer Security,1998,6(3):151~180
  • 6Lindqvist U,Porras P A.Detecting computer and network misuse through the production-based expert system toolset (PBEST).In:Proc.of the IEEE Computer Society Symposium on Research in Security and Privacy.1999.146~161
  • 7Debar H,Becket M,Siboni D.A neural network component for an intrusion detection system.In:IEEE.PROC SYMP SECUR PRIVACY.PISCATAWAY,NJ (USA):IEEE SERVICE CENTER,1992.240~250
  • 8Mukherjee B,Heberlein L,Levitt K N.Network intrusion detection.IEEE Network,1994,8(3):26~41
  • 9Qu D,Vetter B,Wang F,et al.Statistical anomaly detection for link-state routing protocols.In:INT CONF NETWORK PROTOC.LOS ALAMITOS,CA,(USA):IEEE COMP SOC,1998.62~70
  • 10Lee W,Stolfo S,Mok K W.Data mining framework for building intrusion detection models.In:Proc.of the IEEE Computer Society Symposium on Research in Security and Privacy.1999.120~132

共引文献47

同被引文献13

  • 1徐峰,宋如顺,赵洁,刘林强.基于P2P多Agent数据融合入侵检测模型研究[J].计算机工程与应用,2004,40(17):159-161. 被引量:3
  • 2黄道颖,黄建华,庄雷,李祖鹏.基于主动网络的分布式P2P网络模型[J].软件学报,2004,15(7):1081-1089. 被引量:29
  • 3Allen J, Christie A. State of the Practice of Intrusion Detection Technologies[ R ]. Technical Report, Networked Systems Survivability Program. [ s. l. ] : [ s. n. ],2000 : 47 - 83.
  • 4The Intrusion Detection Message Exchange Format . draft- i -etf - idwg - id - mef - xml - 12 [ S/OL]. 2005 - 04. http://www. ietf. org.
  • 5Zhu Y, Hu Y M. Efficient Proximity-Aware Load Balancing For DHT-Based P2P Systems[J]. IEEE Tran. Parallel and Distributed Systems,2005,16(4) :349 - 361.
  • 6Asaka M, Okazawa S. The Implementation of IDA: An Intrusion Detection Agent System[C]//Proceedings. North Falmouth: [s.n.],2001:81-92.
  • 7Jansen W, MeU P, Karygiannis T, et al. Applying Mobile Agents to Intrusion Detection and Response[R]. National Institute of Standards and Technology Computer Security Division, NIST Interim Report (IR) - 6461. [s.l. ] : [s. n. ] ,1999.
  • 8张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..
  • 9李洛 李拥军.基于Agent多媒体数据库模型的研究[J].计算机应用研究,2002,(10):191-194.
  • 10林果园,黄皓,张永平.入侵检测系统研究进展[J].计算机科学,2008,35(2):69-74. 被引量:26

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部