期刊文献+

一种基于邻近距离的分布式入侵防御系统模型 被引量:1

Distributed IPS Model Based on Near Neighbor Distance
下载PDF
导出
摘要 分析了现有入侵防御系统的体系结构及存在的主要问题;根据入侵防御系统的特点,提出了一种基于邻近距离的分布式入侵防御系统(Intrusion Prevention System,IPS)模型。模型定义了系统中的消息类型,采用基于消息的协作方式可增强系统部署的灵活性,通过计算节点间的邻近距离优化通信范围,并给出相应的消息转发策略,以减少系统的消息量。实验表明,模型可以显著减少分布式入侵防御系统的网络负载。 The characteristics and problems of Intrusion Prevention System (IPS) architecture were analyzed.and a distributed IPS model based on near neighbor distance was proposed in this paper. In the model, message types transmitted between cooperation nodes were defined, and a message-based cooperation method was adopted to enhance the flexibility for system deployment. In order to reduce the redundant message, the distance between nodes was calculated and the communication region was optimized in the model. The experimental results show that the model decreases the IPS network load evidently.
出处 《计算机科学》 CSCD 北大核心 2009年第9期55-58,共4页 Computer Science
基金 国防科工委"十一五"预研计划(No.C0820061362-06 No.A1420080183) 国家"863"国家信息安全计划(No.2007AA01Z464) 船舶工业国防科技预研基金项目(No.08J3.7.8)资助
关键词 分布式 入侵防御系统 网络负载 协作 Distributed, Intrusion prevention system(IPS), Network load,Cooperation
  • 相关文献

参考文献9

二级参考文献38

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8[1]Allen, J., Christie, A., Fithen, W., et al. State of the practice of intrusion detection technologies. CMU/SEI-99-TR-028, 2000. http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028abstract.html.
  • 9[2]Stevens, W.R. Unix Network Programming (Vol.1) Networking APIs: Sockets and XTI(2nd ed.). Prentice Hall PTR., 1998.
  • 10[3]Roesch, M. Snort-Lightweight Intrusion Detection for Networks. In: Proceedings of the USENIX LISA'99 Conference. http://www.usenix.org/events/lisa99/full_papers/roesch/roesch.pdf

共引文献184

同被引文献23

  • 1李刚,薛一波,汪东升.一个千兆网络入侵防御系统的设计与实现[J].小型微型计算机系统,2006,27(11):2025-2029. 被引量:2
  • 2赵婷,吴其聪.入侵检测产品及入侵防御产品现状[J].信息网络安全,2007(3):39-40. 被引量:1
  • 3潘仰峰,刘渊.基于数据挖掘的入侵防御研究[J].计算机工程与设计,2007,28(1):56-58. 被引量:4
  • 4舒泽萍,张鹰.基于分布式联动技术的网络安全分析[J].信息网络安全,2007(7):24-26. 被引量:1
  • 5周熠.网络攻击方法剖析与防卫措施的研究与探讨[J].信息网络安全,2007(9):37-40. 被引量:3
  • 6Agarwal M, Biswas S, Nandi S. Detection of De-authentication Denial of Service attack in 802,11 networks[EB/OL].http://ieeexplore.ieee.org/ xpl/login.jsp?tp=&arnumber6726015&url=http%3A%2F%2Fieeexplore. ieee.org%2Fxpls%2Ficp.jsp%3Farnumber%3D6726015,2015 -05- 20.
  • 7Dr. Alaa Al-hamami,Tahani Alawneh. Developing a Host Intrusion Prevention System by Using Data Mining[C]// 2012 International Conference on Advanced Computer Science Applications and Technologies:409-413.
  • 8Ekgapark Wonghirunsombat, Teewalee Asawaniwed, Vassapon Hanchana, et al. A Centralized Management Framework of Networkbased Intrusion Detection and Prevention System[C]// 2013 10th InternationalJoint Conference on Computer Science and Software Engineering (JCSSE) 183-188.
  • 9Tom a sek M, Cajkovsk3 M, Klimek I. Cloud-Centric Application Tracing and User Monitoring Intrusion Prevention System[C]//INES 2013 IEEE 17th International Conference on Intelligent Engineering Systems · June 19-21, 2013, Costa Rica:339- 343.
  • 10Yudai Kato, Yuji Makimoto, Hironori Shirai, et al. Monitoring Library Function-based Intrusion Prevention System with Continuing Execution Mechanism[C](/2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing:548-554.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部