期刊文献+

一种异构分布式防火墙与入侵检测联动构架的通信机制 被引量:3

Communication Mechanism Design for Heterogeneous Distributed Interaction Framework Between Firewall and IDS
下载PDF
导出
摘要 提出一种基于异构分布式联动构架的通信机制,设计了入侵检测和分析与规则分发服务器、分析与规则分发服务器和防火墙节点之间的通信格式.分为三个层次实现了通信协议,给出了详细的通信流程,并进行了性能测试. A new kind of communication mechanism for heterogeneous interaction framework is proposed. Designed the communication format between ADS(Analysis and Distribution Server) and IDS or Firewall Nodes. It is divided into two levels to achieve the communication protocol. We give out a detailed communication process and the test results.
作者 戴硕 杜晔
出处 《微电子学与计算机》 CSCD 北大核心 2009年第8期94-97,共4页 Microelectronics & Computer
基金 教育部国家大学生创新实验计划项目
关键词 通信机制 分布式防火墙 入侵检测 联动 XML communication mechanism distributed firewall intrusion detection interaction XML
  • 相关文献

参考文献3

二级参考文献19

  • 1林昭文,王鲲鹏,马严.IPv6入侵检测系统性能优化的研究与实现[J].通信学报,2006,27(z1):68-71. 被引量:2
  • 2郭帆,余敏,叶继华.一种基于关联和代理的分布式入侵检测模型[J].计算机应用,2007,27(5):1050-1053. 被引量:6
  • 3LOCASTO M E, PAREKH J, STOLFO S, CUCS-012-04, Collaborative distributive intrusion detection[ R]. New York: Columbia University, Computer Science Department, 2004.
  • 4DEBAR H. The intrusion detection message exchange format [ EB/OL]. [ 2006 - 03 - 16 ]. http://www.ietf. org/internet-drafts/ draft -ietf-idwg-idmef-xml-16. txt.
  • 5PORRAS P. The common intrusion detection framework architecture [ EB/OL]. [ 1999 - 09 - 10]. http://gost. isi. edu/cidf/drafts/architecture. txt.
  • 6PORRAS P, NEUMMAN P. EMERALD: event monitoring enabling response to anomalous live disturbances[ C/OL]//The 20th National Information System Security Conference. Baltimore, Maryland, USA, 1997:353 - 365[2007- 10 -01]. http://citeseer. ist. psu. edu/porras97emerald. html.
  • 7SPAFFORD E, ZAMBONI D. Intrusion detection using autonomous agents[J]. Computer Networks, 2000, 34(4): 547-570.
  • 8FREIER A , KARLTON P , KOCHER P . The SSL Protocol : Version3.0[ S]. 1996.
  • 9Cheekiralla S, Engels D W. An IPv6-Based Identification Scheme[C]//}roc. of IEEE International Conference on Communications. [S. l.]: IEEE Press, 2006: 281-286.
  • 10Snort Project[Z]. (2007-04-04). http;//www, snort.org/.

共引文献10

同被引文献25

  • 1谈文蓉,刘明志,谈进.联动防御机制的设计与实施[J].西南民族大学学报(自然科学版),2004,30(6):796-798. 被引量:2
  • 2鲜继清,谭丹,陈辉.局域网中个人防火墙与入侵检测系统联动技术研究[J].计算机应用研究,2006,23(5):105-106. 被引量:6
  • 3Snort 2.x数据区搜索规则选项的改进.http://www.xfocus.net/articles/200509/824.html.
  • 4SnortSam related.http://www.SnortSam.net/documentation.html.
  • 5SnortSam and Portscanning Detection.http://kb.linuxnetworkcare.com/node/16.
  • 6Ioannidis S. Implementing a distributed firewall[C]// Proceedings of the ACM Conference on Computer and Communications Security, NY, USA: ACM, 2000:190 -199.
  • 7HALBOOB W, ABULAISH M, ALGHATHBAR K S. Quaternary privacy-levels preservation in computer forensics investigation process[C]//IEEE International Conference on Communications. IS.1.]: IEEE, 2011: 777- 782.
  • 8KE Hung-jui, LIU J, WANG Shiuh-jeng, et al. Hash-algorithms output for digital evidence in computer forensics[C]//IEEE International Conference on Communications. [S.I.]: IEEE, 2011: 399-404.
  • 9ELEAZAR A A, MARIKO N M, HECTOR M P M. Network forensics with neurofuzzy techniques[C]//IEEE International Conference on Circuits and Systems. [S.1.]: IEEE, 2009: 848-850.
  • 10HOELZ B W P, RALHA C C GEEVERGHESE R, et al. A cooperative multi-agent approach to computer forensics [C]//IEEE International Conference on Communication. [S.1.]: IEEE, 2008: 477- 483.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部