期刊文献+

基于信任度量机制的分布式入侵检测系统 被引量:1

Honesty-rate measuring based distributed intrusion detection system
原文传递
导出
摘要 针对现有分布式入侵检测系统中的安全和信任问题,引入节点间信任度量机制。系统中所有协同节点初始信任值均为1,根据节点的状态和行为信息,信任值将动态增大或者减小。通过比较信任值来去除或者减小恶意节点的有害信息影响,从而减少系统的错报和误报。典型案例分析发现,引入信任度量机制的分布式入侵检测系统能有效提高检测的准备度,增强检测能力。 A novel honesty-rate measuring based approach is proposed to improve the security and trust of distributed intrusion detection systems.All the cooperative nodes join the system with an initial value of 1 for an honesty rate.The honesty rate of a node dynamically increases or decreases depending on its status and behavior.The proposed approach compares the honesty rate of each node to eliminate or reduce the impact of harmful information from malicious nodes,and then reduces the false positives and false negatives of the intrusion systems.Experiments and analyses of a representative case confirm that the ability of the proposed approach improves detection accuracy and detection capability.
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2011年第9期77-80,共4页 Journal of Shandong University(Natural Science)
基金 国家863重点基金项目(2008AA01Z407) 湖南省自然科学基金项目(07JJ5084) 广东省科技计划项目资助(2009B080701031)
关键词 信任度量机制 分布式 入侵检测 ossec honesty-rate measuring distributed intrusion detection ossec
  • 相关文献

参考文献8

  • 1SNAPP S R, BRENTANO J, DIAS G V, et al. A system for distributed intrusion detection [ C ]// Proceedings of the IEEE COM PCON 91. Washington: IEEE Computer Society.
  • 2Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. A survey of coordinated attacks and collaborative intrusion detection[J]. Computers & Security, 2010, 29( 1 ) :124-140.
  • 3JANAKIRAMAN R, ZHANG M. Indra: a peer-to-peer approach to network intrusion detection and prevention [ C]//Proceedings of the 12th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. Washington: IEEE Computer Society, 2003: 226-31.
  • 4YEGNESWARAN V, BARFORD P, JHA S. Global intrusion detection in the DOMINO overlay system [ C ]// Proceedings of Network and Distributed Security Symposium (NDSS). Washington: IEEE Computer Society, 2004.
  • 5Sourcefire Inc. Snort [ EB/OL ]. [ 2011-04-15 ]. www. snort, org.
  • 6薛严冬,韩秀玲,戴尚飞.基于Snort的分布式协作入侵检测系统[J].计算机工程,2010,36(19):165-167. 被引量:5
  • 7TREND MICRO. OSSEC [ EB/OL ]. [ 2011-04-15 ]. http ://www. ossec, net.
  • 8Poly Sen, Nabendu Chaki, Ritupama Chaki. HIDS: honesty-rate based collaborative intrusion detection system for mobile Ad-Hoc networks [ C ]// Proceedings of 7th Computer Information Systems and Industrial Management Applications. Washington: IEEE Computer Society, 2008 : 121-126.

二级参考文献3

  • 1姜华斌,江文,谢冬青.一种基于环形结构的新型分布式入侵检测模型[J].计算机工程,2005,31(23):143-145. 被引量:2
  • 2Razak S A, Fumell S M, Clarke N L, et al. Friend-assisted Intrusion Detection and Response Mechanisms for Mobile Ad Hoc Networks[J]. Ad Hoc Networks, 2008, 6(7): 1151-1167.
  • 3Gambetta D. Can We Trust Trust?[M]//Blackwell B. Trust: Making and Breaking Cooperative Relations. [S. l.]: Oxford, 1990: 213-237.

共引文献4

同被引文献12

  • 1GRIFFIN J, JAEGER T, PEREZ R. Trusted virtual domains: toward secure distributed services[C]//Proceedings of the 1st Workshop on Hot Topics in Systems Dependability. Yokohama: IEEE Press, 2005: 1-6.
  • 2FENG Fujun, CHUANG Lin, PENG Dongsheng, et al. A trust and context based access control model for distributed systems[C]//Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications(HPCC'08).Washington: IEEE Computer Society, 2008: 629-634.
  • 3HAN Guangjie, JIANG Jinfang, SHU Lei, et al. Management and applications of trust in wireless sensor networks: a survey[J]. Journal of Computer and System Sciences, 2014, 80(3): 602-617.
  • 4BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 1996: 164-173.
  • 5KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The EigenTrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International World Wide Web Conference(WWW'03).New York: ACM Press, 2003: 640-651.
  • 6ZHOU Runfang, HWANG K. Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473.
  • 7SABATER J, SIERRA C. REGRET:a reputation model for gregarious societies[C]//Proceedings of the 4th International Workshop on Deception.Bologna:[s.n.], 2001: 61-69.
  • 8SONG Shanshan, HWANG K, ZHOU Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005, 9(6): 24-34.
  • 9MA Shunan, HE Jingsha, SHUAI Xunbo. An access control method based on scenario trust[J]. International Journal of Computational Intelligence Systems, 2012, 5(5): 942-952.
  • 10SCHLOSSER M T, CONDIE T E, KAMVAR S D. Simulating a file sharing P2P network[C]//Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing Budapest. Hungary: [s.n.], 2003: 69-80.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部