期刊文献+

基于Agent的入侵检测系统框架研究 被引量:12

The Research of the Architecture of Agent-Based Intrusion Detection System
下载PDF
导出
摘要 文章在CIDF(通用入侵检测框架)的基础上,引入了静态智能Agent和移动Agent,提出了基于Agent的入侵检测系统框架的构想,采用静态智能Agent实现事件组件和分析组件的功能,采用移动Agent实现响应组件的功能。此框架的特点包括可扩展性、可动态配置、集成性、有效性、便于维护、升级和可自动响应等等,从而极大地改善了入侵检测系统的性能。 This article proposes an idea of agent-based intrusion detection system architecture by introducing intelligent agents and mobile agents based on CIDF(common intrusion detection framework).The authors use intelligent agents to implement event component and analyze component function and mobile agents to implement response component func-tion.This architecture is characterized of scalability,dynamic configuration,integration,availability,easy maintenance,up-grade and automatic response.Therefore,this architecture manages to improve the performance of intrusion detection sys-tem.
作者 赵铭 罗军舟
出处 《计算机工程与应用》 CSCD 北大核心 2002年第18期176-181,共6页 Computer Engineering and Applications
基金 江苏省应用研究基础项目(编号:BJ000002) 教育部"跨世纪优秀人才培养计划"基金项目 高等学校重点实验室访问学者基金项目
关键词 AGENT 入侵检测系统框架 计算机网络 网络安全 intrusion detection,intelligent agent ,mobile agent ,CIDF
  • 相关文献

参考文献3

二级参考文献9

  • 12.Smaha S E.Haystack An intrusion detection system.In IEEE Four- th Aerospace Computer Security Applications Conference,USA:Or- lando,FL,Dec.1988
  • 23.Levitt K N,Heberlein L T,Mukherjee B.A method to detect intru- sive activity in a networked environment.In 14th National Computer Security Conference,Washington,DC,USA:Oct.1991:362-371
  • 34.Pagurek B,White T,Bieszczad A.A Network modeling for manage- ment applications using intelligent mobile agents.Journal of Network and Systems Management,September 1999;7(3)
  • 45.Vigna G,Fuggetta A,Picco G P.Understanding code mobility.IEEE TRANSACTIONS On Software Engineering,1998;24(5):342-361
  • 56.Picco G P,Baldi M.Evaluating the tradeoffs of mobile code design paradigms in network management applications.In the 20th Interna- tional Conference on Software Engineering ICSE'98,Kyoto,Japan: IEEE CS Press,April 1998
  • 67.Lane T,Brodley C E.Temporal sequence learning and data reduc- tion for anomaly detection.In Proceedings of the Fifth ACM Confer- ence on Computer and Communications Security,1998:150-158
  • 78.Bishop M,Dilger M.Checking for race conditions in file accesses. Computing Systems,Spring 1996;9(2):131-152
  • 8苏桂芹,李秀珍.小学数学练习课六步教学模式的探索[J].小学数学教育,2015(5):16-17. 被引量:4
  • 9李宾妮.结合学教实际 实施精准练习——新课改下的小学数学练习课教学研究和思考[J].数学学习与研究,2017,0(19):111-111. 被引量:8

共引文献23

同被引文献29

  • 1韩景灵,孙敏.一种改进的基于Agent的分布式入侵检测系统[J].电脑开发与应用,2007,20(1):19-20. 被引量:1
  • 2喻剑平 阎巧.入侵检测系统的研究和发展方向.信息安全与通信保密,2001,.
  • 3[1]W A Jansen. Intrusion detection with mobile agents[J]. Computer Communications. 2002;25:1392~1401
  • 4[2]Teng H S. Adaptive real-time anomaly detection using inductively generated sequential patterns. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland CA, May 1990,278~284
  • 5Jai Sundar Balasubramaniyan, Jose Omar Garcia- Fernandez, David Isacoff, et al, An Architecture for Intrusion Detection Using Autonomous Agents [ R ]. Technical Report 98- 05, COAST Laboratory, Purdue University, West Lafayette, IN 47907-1398, CERIAS Tech Report TR-99-11 17,1998.
  • 6Common Vulnerabilities and Exposures[EB/OL]. http://www.cve.mitre.org/, 2003-02- 10/2003-08- 15.
  • 7.防火墙与入侵检测系统的区别[EB/OL].http://neteye.neusoftcom/Docs/News/html/20020607133914950/htmlfile/20020607133914950html,2002-06-6/2003-08-15.
  • 8李江.使用移动代理技术的网络攻击检测系统[EB/OL].http://www.ccnu.com/suject/check/check3.html,2003-08-15.
  • 9王东.防火墙与入侵检测系统的区别.[EB/OL] http://neteye.neusoft.com/Docs/News/html/20020607133914950/htmlfile/20020607133914950.html .2002-6-6/2003-8-15.
  • 10李江.使用移动代理技术的网络攻击检测系统.[EB/OL]http://www.ccnu.com/suject/check/check3.html. 2003-8-15.

引证文献12

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部