摘要
针对传统分布式入侵检测系统的缺陷,文章提出了一种适用于无线网络通信环境的新型分布式入侵检测系统模型,详细介绍了其组成部分:逻辑检测域、中心分析器、全局数据库和用户接口。新模型提高了系统的整体检测效率,有效地避免了中心分析器单点失效的问题。
出处
《移动通信》
2009年第16期17-20,共4页
Mobile Communications
参考文献5
-
1Eugene H Spafford, Diego Zamboni. Intrusion Detection Using Autonomous Agents[J]. Computer Networks, 2000 (34): 547-570.
-
2Porras P, Schnackenberg D, Staniford Chen S, et al. The Common Intrusion Detection Framework Architecture[EB/OL]. 2005. http://www, isi. edu/ gost/cidf/drafts/architecture, txt. 25(15): 1374- 1391.
-
3Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang. Design and Implementation of Decentralized Prototype System for Detecting Distributed Attacks[J]. Computer Communications, 2002.
-
4P Ning, X S Wang, S Jajodia. Modeling Requests Among Cooperating Intrusion Detection Systems[J]. Computer Communications, 2000,23(17): 1702-1715.
-
5林昭文,赵毅德,马严.基于Agent的分布式协作入侵检测系统[J].计算机工程,2008,34(5):150-152. 被引量:1
二级参考文献5
-
1Balasubramaniyan J S, Garcia-Fernandez ] O, Isacoff D. et al. An Architecture for Intrusion Detection Using Autonomous Agents[R]. Center for Education and Research in Information Assurance and Security, Purdue University, CERIAS Technical Report: 98/05, 1998-06-11.
-
2Bass T. Intrusion Detection Systems and Multisensor Data Fusion[J]. Communications of the ACM, 2000, 43(4): 99-105.
-
3Intrusion Detection Working Group. The Intrusion Detection Exchange Protocol (IDXP)[Z]. (2002-08-23). http://www.ietf.org/ internet-drafls/drafl-ietf-idwg-beep-idxp-07.txt.
-
4Intrusion Detection Working Group. Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition[Z]. (2005-02-15). http://www. ieff.org/internet-drafts/draft-ietf-idwg-idmef-xml- 16.txt.
-
5Barrus J, Rowe N C. A Distributed Autonomous-agent Network Intrusion Detection and Response System[Z]. [2007-04-16]. http:// www,cs,nps,navy.mil/people/faculty/rowe/barruspap,html.
-
1李光.基于Agent的网络入侵检测系统的架构[J].科学时代,2013(20).
-
2林昭文,赵毅德,马严.基于Agent的分布式协作入侵检测系统[J].计算机工程,2008,34(5):150-152. 被引量:1
-
3马占飞,郑雪峰.Agent技术在分布式入侵检测系统的应用研究[J].计算机应用研究,2008,25(4):1127-1129. 被引量:3
-
4马占飞.基于群体“软件人”的智能入侵防御协作模型[J].阴山学刊(自然科学版),2008,22(3):49-53. 被引量:1
-
5曹江华.Linux系统维护和开发命令详解[J].开放系统世界,2005(11):101-106.
-
6步山岳.动态链接库DLL[J].微型电脑应用,2002,18(1):60-62. 被引量:3
-
7胡和平,肖述超.一种分布式入侵检测系统模型[J].计算机工程与科学,2005,27(7):4-6. 被引量:4
-
8Maxim推出带有模拟LDD接口的SFP+光模块控制器[J].电子制作,2010,18(4):5-5.
-
9带有模拟LDD接口的SFP+光模块控制器[J].电子设计工程,2010,18(4):154-154.
-
10江红.SRAM LDD的版图优化及智能实现方案[J].中国科技纵横,2015,0(13):68-69.