期刊文献+

一种基于移动代理的改进型分布式入侵检测系统模型研究与实现 被引量:1

ON AN IMPROVED MODEL OF MOBILE AGENT-BASED DISTRIBUTED INTRUSION DETECTION SYSTEM AND ITS IMPLEMENTATION
下载PDF
导出
摘要 针对现有的基于移动代理的入侵检测系统,自身安全性低、难以应对分布式入侵行为的缺陷。提出一种改进的模型,为每一个移动代理添加身份验证、完整性鉴定和加密机制,提高了入侵检测系统自身的安全性;在检测实体中加入监视Agent和响应Agent,通过多Agent技术来实现检测自治化和多主机间检测信息的协调,有效地检测了分布式的攻击行为。 Present mobile agent-based intrusion detection system has the defects of low secure itself and hard to cope with the distributed intrusions.In light of these,the paper presents an improved model,in it the ID authentication,integrity identification and encryption mechanism are appended onto every mobile agent,which raises the security of intrusion detection system itself;for testing entities,the monitoring agent and responding agent are inserted,with the use of multi-agent technology to achieve the autonomy of detection and the coordination of detecting information between multiple hosts,thus the distributed attacks are detected effectively.
出处 《计算机应用与软件》 CSCD 2010年第5期136-138,161,共4页 Computer Applications and Software
基金 黑龙江省科技厅基金项目(GC05A124)
关键词 入侵检测系统(IDS) 分布式 移动代理 系统安全 Intrusion detection system(IDS) Distribution Mobile agent System security
  • 相关文献

参考文献7

二级参考文献70

  • 1徐小龙,王汝传.移动代理安全机制的研究[J].计算机工程与应用,2004,40(22):6-9. 被引量:6
  • 2[1]D.Dustupta,F.Gonzalez.CIDS:Agent-based intrusion detection system.Computer & Security(2005)24:387-398
  • 3[2]Wayne A.Jansen.Intrusion detection with mobile agents.Computer communications25(2002):1392-1401
  • 4[3]H.Spafford,D.Zamboni.Intrusion detection using autonomous agents.Computer Networks34(2000):547-570
  • 5Wong D,Mobile Agents First Int Workshop MA'97,1997年
  • 6Young A,Proc of the 4th Int Workshop FSE'97,1997年
  • 7LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 8LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 9KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 10LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.

共引文献346

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部