期刊文献+

一种分布式入侵检测系统构架 被引量:11

A Distibuted Intrusion Detection Frame
下载PDF
导出
摘要 As the process of proliferation of the Internet progresses and network security, the intrusion detection becomes a technical attraction. Now, the research of intrusion detection technology is an emerging and thriving academic field. Because of security and the confidential, papers on the topic are rare. Generally ,those papers only involve with conceptions and common knowledge. The papers on distributed intrusion detection frame ,intrusion detection immune system and resisting subversion are more rare. The paper is on these problems and solves some difficulties. As the process of proliferation of the Internet progresses and network security, the intrusion detection becomes a technical attraction. Now, the research of intrusion detection technology is an e-merging and thriving academic field. Because of security and the confidential, papers on the topic are rare. Generally ,those papers only involve with conceptions and common knowledge. The papers on distributed intrusion detection frame,intrusion detection immune system and resisting subversion are more rare. The paper is on these problems and solves some difficulties.
作者 韩宏 卢显良
出处 《计算机科学》 CSCD 北大核心 2001年第9期51-54,共4页 Computer Science
关键词 计算机网络 网络安全 分布式入侵检测系统 计算机安全 Distributed, Intrusion detection. Resisting subversion frame, Intrusion immune system, System interface
  • 相关文献

参考文献10

  • 1[1]Allen J, Christie A. Sate of practice of intrusion detection technologies: [Technical report CMU/SEI-99-TR-028].1999
  • 2[2]Janse W, Mell P. Applying Mobile Agents to Intrusion Detection and Response: [NIST Interim Report(IR)-6415Oct]. 1999
  • 3[3]Paxson V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 1999,31(23-24):2435~2463
  • 4[4]Porras P A. Detecting Computer and Network Misuse Through the Production-based Expert System Toolset(P-Best). In:Proc. of 1999 IEEE Symposium on Security and Privacy, May 1999. 9~12
  • 5[5]Spafford E. An Architecture for Intrusion Detection Using Autonomous Agents: [COAST Technical report ]. June 1998
  • 6[6]Lee W. A Data Mining Framework for Building Intrusion Detection Models. In:Proc. of 1999 IEEE Symposium on Security and Privacy,May, 1999
  • 7[7]Jagannathan R. Lunt T. System Design Document:Next-Generation Intrusion Dectection Expert System(NIDES).System Design Document: A007, A012, A014 March 9,1993
  • 8[8]Ingram D J. Kremer H. Distributed Intrusion Detection for Computer Systems Using Communicating Agents. In:the Proc. of the 2000 Command and Control Research and Technology Symposium, June 2000
  • 9[9]Helemer G G.,Wong J S. K. Intelligent Agents for Intrusion Detection
  • 10[10]Libicki L. Defending Cyberspace and Other Metaphors

同被引文献24

  • 1穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 2THOMASS著 熊志辉 胡季红 叶子 译.Red Hat Linux 系统管理大全[M].北京:机械工业出版社,2001..
  • 3鸵鸟工作室.Linux网络应用大全[M].北京:机械工业出版社,2000..
  • 4Allen J, Christie A. State of Practice of Intrusion Detection Technologies[ R]. Technical Report CMU, 1999.
  • 5Janse W, Mell P. Applying Mobile Agents to Intrusion Detection and Response[ R]. NIST Interim Report( IR), 1999.
  • 6Shao-chun Zhong, et al. A Safe Mobile Agent System for Distributed Intrusion Detection[ C]. Xi'an: Proceedings of the 2nd International Conference on Machine Learning and Cybernetics, 2003.
  • 7Jongwook Moon, et al. Accelerating Firewall Through Intelligent Self-Learning[ C]. Proc. of IEEE International Conference on System,Man and Cybernetics ,2003.
  • 8Robert Zalenski. Firewall Technologies[J]. IEEE, 2002, (2) :24-29.
  • 9Bridges S;R Vanghn.Intrusion detection via fuzzy data mining,2000.
  • 10Xiong F L;Li S W.An Algorithm of Characteristic Expansion for Fuzzy Reasoning Based on Treple I Method,2001.

引证文献11

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部