期刊文献+

ADIDS安全通信模块的设计与实现

Design and implementation of ADIDS security communication module
下载PDF
导出
摘要 为了提高Ad Hoc网络的安全性,基于Snort入侵检测软件设计了一种安全的Ad Hoc分布式入侵检测系统(ADIDS),并实现了系统中各分布式节点上代理(Agent)之间的安全通信。介绍了其中的安全通信模块的设计与实现细节,包括入侵检测交换协议的改进、组播的实现、XML Encryption技术的应用等。实验结果表明,该模块能够适应Ad Hoc网络的特点,并满足ADIDS关于通信效率、通用性和安全性方面的要求。 To improve the security of Ad Hoc network,a secure Ad Hoc distributed intrusion detection system(ADIDS) based on Snort is designed,and the secure communication between the distributed agent is also realized.The design and implementation of secure communication module is mainly presented,including improved intrusion detection exchange protocol,multicast implementation,XML encryption technology applications.The results show that the module can adapt to the characteristics of Ad Hoc network and meet ADIDS on the communication efficiency,universality and safety requirements.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第15期3356-3359,共4页 Computer Engineering and Design
基金 上海市自然科学基金项目(08ZR1400400) 上海市教育发展基金会晨光计划基金项目(2007CG42)
关键词 AD Hoc分布式入侵检测系统 代理 安全通信模块 设计 实现 ADIDS agent security communication module design implementation
  • 相关文献

参考文献10

  • 1Wei Zhang,Shaohua Teng,Xiufen Fu,et al.Research on communication mechanism among cooperating multi-intrusion detection agents[C].Beijing,China:5th IEEE International Conference on Cognitive Informatics,2006:743-748.
  • 2Tong Xiaojun,Cui Minggen,Ma Chao.The research of distributed intrusion detection and communication protocol based on entity[C].Dalian,China:4th International Conference on Wireless Communications,Networking and Mobile Computing,2008:1-4.
  • 3蔡伟鸿,刘震.分布式入侵检测系统安全通信机制研究[J].计算机工程与设计,2006,27(4):608-611. 被引量:7
  • 4Zhang Yonggnang,Lee Wenke.Intrusion detection in wireless ad-hoc networks[C].Boston,USA:Proceedings of the 6th Annual International Conference on Mobile Computing and Networking,2000:275-283.
  • 5RFC4765,The intrusion detection message exchange format (IDMEF)[S].
  • 6RFC4767,The intrusion detection exchange protocol (IDXP)[S].
  • 7RFC3080,The blocks extensible exchange protocol core[S].
  • 8Xie Jason,Rajesh R,Talpade,et al.AMRoute:Ad Hoc multicast routing protocol[J].Mobile Networks and Applications,2002,7 (6):429-439.
  • 9张丽,余镇危,张杨.移动自组织网络应用层组播研究[J].微计算机信息,2005,21(09X):62-65. 被引量:6
  • 10REC-xmlenc-core-20021210,XML encryption syntax and processing[S].

二级参考文献10

  • 1Carlos de morais Cordeiro.Hrishikesh Gossain and Dharma P.Agrawal.,"Multicast over Wireless Mobile Ad Hoc Networks:Present and Future Directions".IEEE Network,Vol.17.No.1,Jan.2003.
  • 2C.W.Wu and Y.C.Tay,"AMRIS: A Multicast Protocol for Ad hocWireless Networks",Proceedings of IEEE MILCOM 99,Nov.1999.
  • 3Gupta D,Buchheim T,Feinstein B,et al.IAP:Intrusion alert protocol[N].draft-ietf-idwg-iap-05,2001-03-05.
  • 4Douglas R Stinson.Cryptography theoy and practice[M].Beijing:Publishing House of Electronics Industry,2002.135-139.
  • 5Davies D W.Advances in cryptology-eurocrypt91 [C].Berlin:Springer-Verlag,1991.328-336.
  • 6Mell P,Marks D,McLarnon M.A denial of service resistant intrusion detection architecture[J].Computer Networks.2000,34(4):641-658.
  • 7Curry D,Dehar H.Intrusion detection message exchange format data model and extensible markup language(XML)documenttype definition[N].draft-ietf-idwg-idmef-xml-03,2001- 02-03.
  • 8金波,林家骏,王行愚.入侵检测技术评述[J].华东理工大学学报(自然科学版),2000,26(2):191-197. 被引量:41
  • 9史美林,荚春.自组网路由协议综述[J].通信学报,2001,22(11):93-103. 被引量:103
  • 10吕慧勤,褚永刚,吕硕望,杨义先.多视点深入剖析分布式入侵检测系统[J].计算机工程与应用,2004,40(8):8-11. 被引量:1

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部