期刊文献+

一种安全防御系统框架 被引量:6

A Security Defense System Framework
下载PDF
导出
摘要 在分析了现有网络安全防御系统的特点及其缺陷后 ,提出了一种安全防御系统框架 .该框架为开放的系统 ,具有很好的可伸缩性 ,通过将被动防御系统与主动防御系统集成起来 ,协作互动 ,形成集成网络防御系统 ,以期达到实时。 The characteristics and pitfall of existing network security defense system is analyzed . The suggested open framework has good scalability and adaptability, which integrates the advantages of passive defense system and active defense system. The system can share security common policies between firewalls and MAS(Mobile Agent Sensor), which can be easily updated together. The system based on the suggested framework should improve security even by existing facilities.
出处 《小型微型计算机系统》 CSCD 北大核心 2003年第8期1445-1447,共3页 Journal of Chinese Computer Systems
基金 国家 8 63项目基金资助 ( 2 0 0 3 AA1182 0 6)
关键词 协同 审计 安全策略 移动代理传感器 cooperation audit security policy MAS
  • 相关文献

参考文献8

  • 1Steven M. Bellovin. Distribute firewalls[DB/OL], www. purdue. edu 1999,11.
  • 2Julia Allen. , Alan Christie. Sate of practice of intrusion detection technologies[R].Technical Report CMU/SEI-99-TR-028,1999.
  • 3Wayne Janse, Peter Mell. Applying mobile agents to intrusion detection and response[R]. NIST Interim Report(IR)-6416 October, 1999.
  • 4Eugene Spafford. An architecture for intrusion detection using autonomous agents[R]. COAST Technical Report, June 1998.
  • 5Dennis J. Ingrain, H Steven Kremer. Distributed intrusion detection for computer systems using communicating agents[C]. In:Proceedings of the 2000 Command and Control Research and Technology Symposium, June 2000.
  • 6Crosbie M, Spaord E. Defending a computer system using autonomous agents[C]. In:Proceedings of the 18th National Information Systems Security Conference.
  • 7Vern Paxson:Bro:A system for detecting network intruders in real-time[J]. Computer Networks, 1999, (31):23~24.
  • 8Jagannathan R, Teresa Lunt. System design document: nextgeneration intrusion detection expert system (NIDES)[Z]. System Design Document: A007,A012, A014 March 9,1993.

同被引文献33

  • 1纪祥敏,连一峰,戴英侠,许晓利.基于协同的分布式入侵检测模型研究[J].计算机仿真,2004,21(12):132-135. 被引量:5
  • 2邹学强,冯登国.基于Agent的分布式防火墙系统的设计与实现[J].计算机工程,2005,31(13):129-131. 被引量:5
  • 3刘希强.灰色GM模型及其应用[J].系统工程理论与实践,1995,15(1):59-62. 被引量:20
  • 4刘庆云,杨超峰,刘利军.多类型安全系统协同机制的研究与实现[J].计算机工程,2006,32(14):166-168. 被引量:3
  • 5Heady R, Luger G, Hofmeyr A et al.Computer Immunology[J].Communications of the ACM, 1997 ;40 (10) : 88-96.
  • 6Amoroso E G.Intrusion Detection:An Introduction to Intemet Surveillance, Correlation, Traps, Trace Back, and Response[DB/OL].http : //www.intrusion.net/, 1999.
  • 7Roy A Maxion Kimie M C Tan.Benchmarking Anomaly-Based Detection Systems[C].In:Proceeding of the International Conference on Dependable Systems and Networks DSN 2000,2000.
  • 8Susan C L,David V H.Training a Neural-Network Based Intrusion Detector[J].IEEE Transactions on systems,man and cybernetics-parts: System and Humans,2001 ;31(4) :294-299.
  • 9Balajinath B,Raghavan S V.Intrusion detection through learning beha- vior model[J].Computer Communications,2001;24(42):1202-1212.
  • 10李之棠 杨红云.计算机工程与科学,模糊入侵检测模型,100 2005[J].计算机工程与应用,2000,(22):19-53,49.

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部