期刊文献+

基于Agent的入侵检测系统体系结构设计 被引量:3

Architecture Design of an Agent-based Intrusion Detection System
下载PDF
导出
摘要 提出并深入研究了一种基于智能体技术的入侵检测系统的体系结构。该体系结构是一种混合形结构,利用基于主机和基于网络的数据源,同时使用异常检测技术和误用检测技术。该体系结构中还引入数据挖掘的思想,利用数据挖掘技术从安全审计数据中提取关键的系统特征属性,根据这些属性生成安全审计数据的分类模型用于入侵检测,使IDS自动适应复杂多变的网络环境。 This thesis proposes a new architecture of the intrusion detection system (IDS) based on agents. To achieve better accuracy, the architecture adopts security audit data gathered from both host and network, and the architecture adopts a blend frame that makes use of both misuse detection approach and anomaly detection approach. Another highlight of the architecture is introduction of data mining technique. The IDS makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classification engine of audit data. 
出处 《计算机应用》 CSCD 北大核心 2003年第9期42-44,共3页 journal of Computer Applications
关键词 入侵检测系统 智能体 数据挖掘 IDS agent data mining
  • 相关文献

参考文献4

  • 1Chittur A. Model Generation for an Intrusion Detection System Using Genetic Algorithms[D]. Ossining High School, Ossining, NY, Nov27, 2001.
  • 2Stolfo SJ, Lee W, Chan PK, et al. Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project[D]. Columbia University, Georgia Institute of Technology and Florida Institute of Technology, Sept 9, 2001.
  • 3Asaka M, Onabula T, Nakasuka S. Intrusion Detection and Intrusion Route Tracing by Use of Mobile Agents[Z]. Intelligent Agent Technology, 2000.
  • 4Hofmeyr SA, Forrest S, Somayaji A. Lightweight Intrusion Detection for Networked Operation Systems[J]. Journal of Computer Security,1997,5(2).

同被引文献20

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 2王彪.基于网络入侵检测的研究与实现[J].电脑知识与技术,2006(5):39-41. 被引量:2
  • 3Denning D E. An Intrusion Detection, Mode 1[J]. IEEE Transactions on Software Engineering, 1987,13 (2): 222-232.
  • 4Rao, A., Georgeff, M..Modeling rational agents within a BDI-architecture [C]. In Proceedings of Knowledge Representation and Reasoning, (1991) 473-484.
  • 5Shoham Y..Agent Oriented Programming[J], Artificial Intelligence, 1993, 60(1) :51-92.
  • 6Wayne Jansen, Peter Mell, Tom Karygiannis, Don Marks..Applying Mobile Agents tolntrusion Detectian and Response [J]. Nationalinstitute ofstandards and technologycomputer securitydivision, October 1999:10-16.
  • 7M Kaiser, R DiUmann,H Friedrieh,etal. Learning coordination skills in multi-agent system[A]. IEEE/RSJ Int Conf on lntell Robots & Syst[C]. Osaka,1996, 3:1488-1495.
  • 8Michael W. Nicholas RJ. Intelligent Agents:Theory and Praetiee [J], Knowledge Engineering Review, 1995,10(2 ) : 115-152.
  • 9Sycara K P. Multi-gent Systems[J]. AI Magazinge,1998 (2) : 79-89.
  • 10DALMEIJER M, HAMMER D K, AERT A T M. Mobile Software Agents [J]. Computers in Industry, 2000,41 (3) : 251 - 260.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部