期刊文献+

基于MA的分布式入侵检测方法研究

MA-based Distributed Intrusion Detection Method
下载PDF
导出
摘要 本文在总结先前存在的入侵的检测和防御方法的同时,阐述了以移动代理为基础的的入侵检测。相对于传统的方法,这种检测方法很大程度上提高了检测系统进行自我恢复和抵抗毁坏的能力。 This paper summarized the previous intrusion detection and prevention methods, at the same time, elaborated the intrusion detection based on the Mobile Agent. Compared with the traditional method, this detection method improved the ability of self-recovery and resistance to the destruction of detection system to a large extent.
机构地区 佳木斯大学
出处 《价值工程》 2013年第16期199-200,共2页 Value Engineering
基金 黑龙江省教育厅科学技术研究项目结题 项目名称<基于MA的分布式入侵检测方法研究> 项目编号12523057
关键词 移动代理 分布式的入侵检测系统 安全 Mobile Agent distributed intrusion detection system security
  • 相关文献

参考文献4

二级参考文献22

  • 1刘振鹏,杨绍芸,张寿华,周特.一种基于分布式入侵检测的计算机免疫模型[J].计算机工程与设计,2004,25(11):1912-1913. 被引量:4
  • 21,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 32,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 43,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 54,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 65,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 76,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 87,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 9[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980.
  • 10[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232.

共引文献148

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部