期刊文献+

基于Multi-agent的入侵检测模型的研究与实现 被引量:7

Research and Implementation of Multi-agent Based Intrusion Detection System
下载PDF
导出
摘要 介绍了公共入侵检测框架 (CIDF)理论 ,分析了 agent及其 multi- agent的特性 ,并指出了当前 IDS存在的问题 .在上述讨论的基础上 ,提出了一个基于 multi- agent的入侵检测模型 .该模型采用层次结构组织各种 Agent,具有良好的分布性、智能性和可维护性 ,不仅能够有效地解决系统扩展问题和单点失效问题 。 This paper introduces the theory of CIDF, analyzes the characteristics of agent and multi agent, and points out the flaw of existing IDS. On the basis of the above discussion, a multi agent based intrusion detection model is proposed. This model adopts hierarchical structure to organize and manage all kinds of agents.It is distributed, intelligent and maintainable, and not only resoles the problems of scalability and a single point of failure effectively, but also enhancing the whole systems detection efficiency greatly.
出处 《小型微型计算机系统》 CSCD 北大核心 2003年第6期995-998,共4页 Journal of Chinese Computer Systems
基金 国家关键基础研究项目 ( G19990 3 2 70 0 )资助
关键词 入侵检测 通用人侵检测框架 代理 协同检测 intrusion detection CIDF agent collaborative detection
  • 相关文献

参考文献5

  • 1An Introduction to Intrusion Detection - Assessment [Z]. ICSA,Inc.
  • 2Nwana H S. Software agents: an overview[J]. Knowledge Engi-neering Review, 1996, 11(3):1-40.
  • 3Jennings N, Sycara K and Wooldridge M. A roadmap of agent research and development [J]. Journal of Autonomous Agents and Multi-Agent Systems, 1998 (1) : 275 - 306.
  • 4Eugenio Oliveira, Klaus Fischer, Olga Stepankova. Multi-agent system: which research for which applications [J]. Robotics and Autonomous System, 1999 (27):91-106.
  • 5Oates,T. Cooperative information gathering: a distributed problem solving approach [R]. Tech. Report TR-94-66, UMASS,1994.

同被引文献25

  • 1李玮,李学干.入侵检测系统研究[J].微机发展,2005,15(3):42-44. 被引量:2
  • 2Joh E.Canavan.Fundamentals of Network Security.Artech house. 2001.
  • 3Eugene H.Spafford,Diego Zamboni,Intrusion detection using autonomous agents,Computer Networks 34(2000)547-570.
  • 4Wu Yang,Bin-Xing Fang,Bo Liu,Hong-Li Zhang,Intmsion detection system for high-speed network,Computer Communications 27(2004)1288-1294.
  • 5Haiguang Lai,Shengwen Cai,Hao Huang,Junyuan Xie,Hui Li,A Parallel Intrusion Dectecfion System for High-speed NetWorks,ACNS 2004,LNCS 3089 439-451.
  • 6王培,周贤伟,覃伯平,赵鹏,郑连存.基于多代理的无线传感器网络入侵检测系统研究[J].传感技术学报,2007,20(3):677-681. 被引量:11
  • 7Sundaram A.An introduction to intrusion detection[J].The ACM Student Magazine,1996,2(4):3-7.
  • 8Portnoy L,Eskin E,Stolfo S J.Intrusion detection with unlabeled data using clustering[C]//Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001).Philadelphia,PA,November 5-8,2001.
  • 9Han Jiawei,Kamber M.Data Mining concepts and techniques[M].Beijing:China Machine Press,2004.
  • 10Guan Y,Ghorbani A,Belacel N.Y-means:a clustering method for intrusion detection[C]//Proceedings of Canadian Conference on Electrical and Computer Engineering,Montreal,Canada,2003:1083-1086.

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部