期刊文献+

基于移动Agent的分布式入侵检测模型构建 被引量:1

The Model Building of a Distributed Intrusion Detection Based on Mobile Agents
下载PDF
导出
摘要 该文分析了入侵检测系统的基本状况以及移动代理的特点,指出了目前入侵检测系统存在的不足,提出了基于移动代理的分布式入侵检测模型(MADIDS)。此入侵检测系统中,引入了移动代理技术,使得入侵检测系统能够跨平台使用;将基于网络和基于主机的检测结合起来,配置了多个检测部件处理;并将所有配置信息存放在数据库中,从而,实现了数据和处理的分离、数据收集、入侵检测和实时响应的分布化。 Intrusion Detection System’s basic situation and the characteristics of the mobile agent are analyzed. Considering the shortcoming of the current intrusion detection system, a model of a distributed intrusion detection based on mobile agents (MADIDS) is proposed. The MADIDS introduce the mobile agent technology,which make the intrusion detection system can cross-platform use, and will be based on both the network and the host. In addition, the MADIDS Configurate a number of detection agents and every agent focused on the detection of a particular work on the one hand. All the configuration information are stored in the database, thus, which achieve a separation of data and processing, and the distribution of data collection, intrusion detection and real-time response.
出处 《电脑知识与技术》 2009年第7X期5925-5927,共3页 Computer Knowledge and Technology
关键词 入侵检测 移动代理 分布式 intrusion detection mobile agent distributed
  • 相关文献

参考文献3

二级参考文献12

  • 1D.Gavalas,D.Greenwood,M.Ghanbari,M.O'Mahobny.Advanced network monitoring application based on mobile/intelligent,Computer Communications,2000.4.
  • 2何炎样 陈萌.Agent和多Agent系统的设计和应用[M].武汉:武汉大学出版社,2001..
  • 3Gupta D,Buchheim T,Feinstein B,et al.IAP:Intrusion alert protocol[N].draft-ietf-idwg-iap-05,2001-03-05.
  • 4Douglas R Stinson.Cryptography theoy and practice[M].Beijing:Publishing House of Electronics Industry,2002.135-139.
  • 5Davies D W.Advances in cryptology-eurocrypt91 [C].Berlin:Springer-Verlag,1991.328-336.
  • 6Mell P,Marks D,McLarnon M.A denial of service resistant intrusion detection architecture[J].Computer Networks.2000,34(4):641-658.
  • 7Curry D,Dehar H.Intrusion detection message exchange format data model and extensible markup language(XML)documenttype definition[N].draft-ietf-idwg-idmef-xml-03,2001- 02-03.
  • 8金波,林家骏,王行愚.入侵检测技术评述[J].华东理工大学学报(自然科学版),2000,26(2):191-197. 被引量:41
  • 9喻建平,闫巧.入侵检测系统的发展及其研究方向[J].信息安全与通信保密,2002(5):17-19. 被引量:15
  • 10陈瑾,罗敏,张焕国.入侵检测技术概述[J].计算机工程与应用,2004,40(2):133-136. 被引量:21

共引文献8

同被引文献9

  • 1Wikipedia.PRISM(surveillance program)[EB/OL].https://en.wikipedia.org/wiki/PRISM_(surveillance_program).
  • 2Andersen J P.Computer security threat monitoring and surveillance.Technical Repert[R].James P Fort Washington,Pennsylvania,1980.
  • 3Denning D E,Neumann P G.Requirements and model for ides:a real-time intrusion detection system[J].Comput.sci.lah Sri International Menlo Park Ca Tech.rep,1985.
  • 4Heherlein L T,Dias G,Levitt K,et al.A network security mcnitor[J].IEEE Computer Society Symp.on Research in Security and Privacy,1990:296-304.
  • 5K.Broderick,M.Bailey,M.Eastwood.Worldwide Enterprise Server cloud computing 2010-2014 Forecast[R].IDC,2010.
  • 6Dash M,Liu H.Feature selection for classification[J].Intelligent Data Analysis,Amsterdam:IOS Press,1997(3):131-156.
  • 7Han J,Kamber M.Data mining:concepts and techniques[M].Moigan Kaufoiann,2006.
  • 8Dhanalakshmi Y,Ramesh Babu I.Intrusion detection using data mining along fuzzy logic and geneticalgorithms[J].International Journal of Computer Science and Network Security,2008,8(2):27-32.
  • 9程建,张明清,刘小虎,范涛.基于人工免疫的分布式入侵检测模型[J].计算机应用,2014,34(1):86-89. 被引量:7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部