期刊文献+

一种基于移动Agent分布式入侵检测系统

Study of a distributed intrusion detection system based on mobile agents
下载PDF
导出
摘要 针对目前入侵检测系统的不足,将新型分布式处理技术移动Agent与入侵检测融为一体,提出了一种基于移动代理的分布式入侵检测系统(DIDS)的模型;实现了基于该模型的分布式入侵检测系统;采取了保证分布式入侵检测系统自身安全的防范措施。通过移动代理,各Agent相互独立,同时能在网络中自由移动,并具有良好的灵活性,降低了网络通信量和系统负载,有效保证系统的安全。 In view of the current drawbacks of intrusion detection systems, the new distributed processing technology of mobile agents is integrated with the intrusion detection, and a distributed intrusion detection system(DIDS) model based on mobile agents is presented. Some security precautions are taken for the distributed intrusion detection system. Through the mobile agents,the presented intrusion detection system has good flexibility, reduces the amount of network communications and the system load and effectively guarantees the safety of the system.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第7期1081-1084,共4页 Journal of Hefei University of Technology:Natural Science
基金 铜陵学院自然科学研究项目(2007tlxykj005)
关键词 移动AGENT 网络安全 网络入侵检测 分布式入侵检测系统 mobile agent network security network intrusion detection distributed intrusion detection system
  • 相关文献

参考文献6

二级参考文献24

  • 1高荣.[D].合肥:中国科学技术大学自动化系,2001.
  • 2孙忱.[D].合肥:中国科学技术大学自动化系,2003.
  • 3张胜宾.[D].合肥:中国科学技术大学自动化系,2002.
  • 41,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 52,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 63,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 74,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 85,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 96,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 107,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997

共引文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部