期刊文献+

分布式架构下的新型入侵检测系统研究 被引量:3

Research on a New Intrusion Detection System based on Distributed Structure
下载PDF
导出
摘要 入侵检测(Intrusion Detection System,简称IDS)作为一个新兴的技术,成为原有的计算机安全体系很好的补充,正吸引越来越多的人参与到其研究中来。本文对分布式入侵检测系统进行了介绍,提出了一种基于数据挖掘以及分布式系统架构的入侵检测系统。并给出系统各个组件的设计,并对系统的实现框架进行了详细的阐述。最后指出本系统的特点。 As a rising technology,Intrusion Detection System (IDS) becomes an excellent complementary of the system of computer security system. And more and more people apply to this research area. A new distributed intrusion detection system is introduced in this paper,at the same time,and the structure of the intrusion detection system,which uses data mining method,based on mobile agent is represented. The module design and the implementation frame of the system is described in detail. At last,the characteristic of the system is mentioned.
作者 尚翔
出处 《微计算机信息》 北大核心 2008年第36期72-73,76,共3页 Control & Automation
关键词 入侵检测系统 移动AGENT 数据挖掘 Intrusion Detection System (IDS) Mobile Agent Data Mining
  • 相关文献

参考文献3

二级参考文献13

  • 1王杰,李冬梅.数据挖掘在网络入侵检测系统中的应用[J].微计算机信息,2006,22(04X):73-75. 被引量:15
  • 2Barton P Miller,David Koski,Cjin Pheow Lee,etc.Fuzz revisited:A re-examination of the reliability of UNIX utilities and services [R].Technical report,CS-TR -95-1268,Computer Sciences Department,University of Wisconsin,1995.
  • 3W Lee,S J Stolfo.Data mining approaches for intrusion detection [A].In Proceed ings of the 7th USENIX Security Symposium [C].San Antonio,Texas,USA:1998.
  • 4John P Wack,Lisa J Carnahan.Keeping your site comfortably secure: An Introductio n to Internet Firewalls [DB/OL].NIST Special Publication 800-10,U.S.DEPARTMENT OF COMMERCE. .
  • 5S Forrest,S A Hofmeyr,A Somayaji,T A Longstaff.A sense of self for UNIX processe s [A].In Proceedings of the 1996 IEEE Symposium on Security and Privacy [C]. Los Alamitos,CA:1996.120-128.
  • 6S A Hofmeyr,S Forrest,A Somayaji.Intrusion detection using sequences of system c alls [J].Journal of Computer Security,1998,6:151-180.
  • 7W Lee,S J Stolfo,P K Chan.Learning patterns from UNIX process execution traces f or intrusion detection [A].AAAI Workshop on AI Approaches to Fraud Detection a nd Risk Management [C].AAAI Press,1997.7:50-56.
  • 8G G Helmer,J S K Wong,V Honavar,L Miller.Intelligent agents for intrusion detect ion [A].In Proceedings IEEE Information Technology Conference [C].Syracuse,N Y:1998.121-124.
  • 9C Warrender,S Forrest,B Pearlmutter.Detecting intrusions using system calls:alte rnative data models [A].In Proceedings of the 1999 IEEE Symposium on Security and Privacy [C].Los Alamitos,CA:IEEE Computer Society,1999.133-145.
  • 10Wojciech Purczynski.Sendmail & procmail local root exloits on Linux kernel up to 2.2.16pre5 [DB/OL].BUGTRAQ Mailing list(bugtraq@securityfocus.com),2000-06-09 .

共引文献35

同被引文献12

  • 1宁彬.基于数据挖掘的入侵检测系统研究[J].微计算机信息,2008,24(6):97-98. 被引量:10
  • 2史亮,李斌,庄镇泉.基于多主体技术的分布式入侵检测系统的研究与设计[J].计算机工程与科学,2005,27(2):5-8. 被引量:2
  • 3Phil Porras, SRI Dan Schnackenberg, Boeing Stuart Staniford- Chen.The common intrusion detection framework architecture [Z].
  • 4窦伟平,邱伟,李传林.网络入侵检测中数据采集技术的研究.第19次全国计算机安全学术交流会论文.
  • 5Curbs A. Carver. Limiting Uncertainty in Intrusion Response. IEEE, 2000.
  • 6Tim Bass. Multisensor data fusion for next generation distributedintrusion detection systems[C]. 1999 IRIS National Symposium on Sensor and Data Fusion,The Johns Hopkins University Applied Physics Laboratory, 1999.24-27.
  • 7Balasubramaniyan J S, Omar J. An Architecture for Intrusion Detection Using Autonomous Agents [A]. Proc of 14th Annual Computer Security Application Conf [C]. 1998. 13-24.
  • 8Phillip A Porras, Peter G Neumann. EMERALD: Event Mon- itoring Enabling Response to Anomalous Live Disurbanees[A]. Proe of the 20th NIS Secerity Conf[C]. 1997.
  • 9Wbite T. Hadoop: The Definitive Guide [M]. [S. 1.]: O' Reillly Media, Inc., 2009.
  • 10Dean J. MapReduce: Simplified Data Processing on Large Clus- ters[C] Proc. of the 6th IEEE Symposium on Operating System De- sign and Implementation. San Francisco, CA, USA: [s. n.], 2004.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部