期刊文献+

基于移动Agent的层次模型IDS设计

Hierarchical Model Based on Mobile Agent IDS Design
下载PDF
导出
摘要 入侵检测系统作为防火墙等技术的有效补充被广泛应用于实际当中,而传统的入侵检测系统存在一定的局限性.基于移动代理的入侵检测技术成为了分布式入侵检测研究领域的一个重要方向.分析了现有的入侵检测系统的不足,引入移动代理技术,设计了一种基于移动Agent的分布式层次模型入侵检测系统结构,以提高对可疑行为的分析和响应,有效地应对分布式入侵行为. As one of the effective supplements of firewall technology intrusion detection system is widely used in practice, but the traditional intrusion detection system has some limitations. Intrusion detection system based on mobile agent has become an important direction in the research field of distributed intru sion detection technology. This paper analyzes the deficiency of existing intrusion detection system, intro duces the mobile agent technology,and thus designs a mobileAgentbased distributed intrusion detection system model structure,which can improve the suspicious behavior analysis and response and effectively deal with distributed intrusion behavior.
出处 《吉首大学学报(自然科学版)》 CAS 2012年第2期41-44,共4页 Journal of Jishou University(Natural Sciences Edition)
关键词 移动代理 AGENT 入侵检测 系统设计 mobile agent Agent intrusion detection system design
  • 相关文献

参考文献7

二级参考文献54

  • 1[1]Balasubramaniyan J S, Garcia-Fernandez J O,Lsacoff D.Architecture for Intrusion Detection Using Autonomous Agents. COAST Technical Report, COAST Laboratory, Purdue University, 1998
  • 2[2]Bace R G. Intrusion Detection. Macmillan Technical Publishing, 1999
  • 3[3]Eskin E,Miller M, Zhong Zhida. Adaptive Model Generation for Intrusion Detection Systems. Athens:Workshop on Intrusion Detection and Prevention, 7th ACM Conference on Computer Security, 2000-11
  • 4Chittur A. Model Generation for an Intrusion Detection System Using Genetic Algorithms[D]. Ossining High School, Ossining, NY, Nov27, 2001.
  • 5Stolfo SJ, Lee W, Chan PK, et al. Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project[D]. Columbia University, Georgia Institute of Technology and Florida Institute of Technology, Sept 9, 2001.
  • 6Asaka M, Onabula T, Nakasuka S. Intrusion Detection and Intrusion Route Tracing by Use of Mobile Agents[Z]. Intelligent Agent Technology, 2000.
  • 7Hofmeyr SA, Forrest S, Somayaji A. Lightweight Intrusion Detection for Networked Operation Systems[J]. Journal of Computer Security,1997,5(2).
  • 8汪成为,面向对象分析、设计及应用,1992年
  • 9LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 10LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.

共引文献255

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部