期刊文献+

全IP宽带移动网络中基于分层P2P的协同防护机制

Corporate Defend Mechanism Based on Layered P2P in All IP Broadband Mobile Networks
下载PDF
导出
摘要 针对基于IMS/SAE的全IP宽带移动网络架构的特点,分析研究了现有入侵检测技术的现状,提出了适用于全IP宽带移动网络的协同检测防护机制。该机制利用P2P技术实现了检测信息的协同交互和共享,通过建立分层的P2P网络架构减小了协同信息的资源占用率和传输时延,能够及时更新全IP宽带移动网络中的检测样本库,提高检测效率。 This paper analyses existing intrusion detection technology based on the features of the all-IP mobile broadband network architecture of IMS/SAE,and presents one collaborative detection defense mechanism applicable to all-IP broadband mobile network.The mechanism achieves synergistic interaction and sharing of detecting information using the P2P technology,reduces the resources utilization and transmission delay of coordination information through the establishment of tiered P2P network architecture,is able to update all-IP broadband mobile network testing sample library,and improves detection efficiency.
出处 《信息工程大学学报》 2010年第5期637-640,共4页 Journal of Information Engineering University
基金 国家科技重大专项基金资助项目(2009ZX03004-002)
关键词 全IP宽带移动网络 对等网络 体系结构 all-IP broadband mobile networks peer-to-peer network architecture
  • 相关文献

参考文献6

二级参考文献25

  • 1徐峰,宋如顺,赵洁,刘林强.基于P2P多Agent数据融合入侵检测模型研究[J].计算机工程与应用,2004,40(17):159-161. 被引量:3
  • 2Department of Defense. Trusted Computer System Evaluation Crite ria[M]. Dec. 1985.
  • 3S R Snapp, S E Smaha, D M Teal and T Grance. The DIDS ( distributed intrusion detection system) prototype[ C ]. In USENIX Association. Proceedings of the Summer 1992 USENIX Conference,Berkeley, CA, USA, June 1992. 227.
  • 4K A Jackson. NADIR: A prototype system for detecting network and file system abuse[ C]. Proc. of the 7th European Conference on Information Systems, Nov 1992.
  • 5N Habra, B Le Charlier, A Mounji, I Mathieu. ASAX: Softwarearchitecture and rule - based language for universal audit trail analysis[C]. Deswarte, Y., Eizenberg, G. (eds.), Proc. of the 2nd European Symposium on Research in Computer Security ( ESORICS'92), Toulouse, France, Nov. 1992, 435-450.
  • 6Marcelo Medina. A layered framework for placement of distributed intrusion detection devices [ C ]. In proceedings of the 21 st National Information Systems Security Conference, Crystal city, Virginia, Oct 1998.
  • 7Nojiri D, Rowe J, Levitt K. Cooperative response strategies for large scale attack mitigation [C]//DARPA Information Survivability Conference and Exposition. IEEE Computer Society, 2003: 293-302.
  • 8Min Cai, Kai Hwang, Yukwong Kwok, et al. Collaborative internet worm containment[C]//IEEE Security & Privacy, 2005, Seattle:IEEE CS Press,2005,
  • 9Koutepas G, Stamatelopoulos F, Maglaris B. Distributed management architecture for cooperative detection and reaction to DDOS attacks[J]. Journal of Networks and Systems Mangament, 2004, 12 (1) :483-490.
  • 10Jelena Mirkovic, Max Robinson, Peter Reiher. Alliance Formation for DDoS Defense[C]//Proc. New Security Paradigms Workshop. ACM SIGSAC. New York: ACM Press, 2003.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部