期刊文献+

基于ARMA的并行入侵检测的负载均衡算法 被引量:3

ARMA-based load balancing algorithm for parallel intrusion detection system
原文传递
导出
摘要 并行网络入侵检测系统架构的提出很大程度上缓解了当前硬件处理能力不足和网络流量激增之间的矛盾,其充分发挥作用的关键在于如何高效稳定地将流量均匀地分配到各个检测引擎上.本文在深入分析负载均衡算法的各个实现要素基础上,基于经典时间序列模型ARMA对网络流量进行了预测,按照周期性预测负载信息的策略,设计实现了ABLB算法,在降低各个检测引擎反馈负担的同时其负载均衡能力、攻击证据保持、高效性和健壮性也得到了保证,在算法分析和实验中进行了讨论和验证. The proposal of parallel intrusion detection system architecture have largely alleviated the contradiction between the shortage of hardware process capabilities and the increase in network traffic. While the key point is how to split the traffic to each detection engine efficiently and steadily. This paper fist had a deep analysis of the load-balancing algorithm and predicted the network traffic based on the classical time series model, ARMA, then designed and implemented the ABLB algorithm with the strat- egy of periodic load forecast information. The algorithm not only could reduce the feedback burden for each detection engine but the load balancing capabilities, maintenance of attacking evidence, high efficiency and robustness were guaranteed also. They have been discussed and verified in algorithm analysis and experiment sections.
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第1期80-86,共7页 Journal of Sichuan University(Natural Science Edition)
基金 国家自然科学基金(60873246) 教育部创新工程重大项目培育资金(708075) 国家教育部博士点基金(20070610032)
关键词 并行网络入侵检测 负载均衡 ARMA 预测负载信息 parallel network intrusion detect, load balance, ARMA, predict load
  • 相关文献

参考文献9

二级参考文献27

  • 1王叔子.时间序列分析的工程应用[M].武汉:华中理工大学出版社,1992..
  • 2杜金观 项静怡 等.时间序列分析--建模与预报[M].合肥:安徽教育出版社,1991.79-98.
  • 3Schaelicke L,Slabach T,Moore B,et al.Characterizing the performance of network intrusion detection sensors[A].Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003)[C].Lecture Notes in Computer Science,Springer-Verlag,2003.
  • 4Coit J,Staniford S,McAlerney J.Towards faster string matching for intrusion detection or exceeding the speed of snort[A].Proc DARPA Information Survivability Conference and Exposition (DISCEX Ⅱ '02)[C].Los Alamitos,Calif:IEEE CS Press,2001.367-373.
  • 5Edwards S.Vulnerabilities of Network Intrusion Detection Systems:Realizing and Overcoming the Risks[Z].Toplayer Networks,2002.
  • 6Kruegel C,Valeur F,Vigna G,et al.Stateful intrusion detection for high-speed networks[A].Proceedings of the IEEE Symposium on Security and Privacy[C].Berkeley,CA:IEEE,2002.285-294.
  • 7Asser N.Tantawi,Don Towsley.Optimal static load balancing in distributed computer systems[J].Journal of the ACM,1985,32(2):445-465.
  • 8Keith W R,David D Y.Optimal load balancing and scheduling in a distributed computer system[J].Journal of the ACM,1991,38(3):676-690.
  • 9Rebecca B,Peter M.Intrusion detection systems.NIST Special Publication on Intrusion Detection Systems (SP 800-31).2001
  • 10Vigna G,Kemmerer R.NetSTAT:A network based intrusion detection approach.Journal of Computer Security,1999,7(1):37-71

共引文献140

同被引文献33

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部