期刊文献+

自治代理的分布式入侵检测系统研究 被引量:2

A Study on Autonomous Agent Distributing Type Intrusion Detection System
下载PDF
导出
摘要 文章在分布式环境中,按照系统和网络的异常使用模式的不同特征和环境差异,分别引入了分布处理、分层管理、自治代理和安全通讯,仿效人体对于外界刺激响应模式的思想,提出了分布式入侵检测系统框架和自治代理组织单元,给出了基于自治代理的分布入侵检测系统体系结构与详细设计。并引入了贝叶斯推理反馈信息的统计方法,对系统检测结果进行动态优化,提高了检测效率和准确性。 In this article,the approaches of distributed processing,hierarchical management ,autonomous agent and security communication are adopted,according to the distinct features and environment diversity of the abnormal usage of system and network,in the distributing type environment ;The framework of distributed intrusion detection system and autonomous agent constructor cell are put forward,emulating how the body answer the provoke coming from the outside world,and the architecture and the detail of the IDS are gave.Moreover the Bayersian reasoning feedback information statistics means are adopted to carry on the dynamic optimization to results of the system detection,thus examination effectiveness and accuracy are lifted.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第24期30-32,共3页 Computer Engineering and Applications
基金 国家863高技术研究发展计划基金资助(编号:863-317-01-10-99) 全国教育科学"十五"规划重点课题资助(编号:AYA010034) 湖北省重点自然科学基金资助(编号:2001ABA001)
关键词 入侵检测系统 自治代理 分布式 贝叶斯推理 Intrusion detection system,Agent ,Distributing type,Bayersian reasoning
  • 相关文献

参考文献10

  • 1蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 2金波,林家骏,王行愚.入侵检测技术评述[J].华东理工大学学报(自然科学版),2000,26(2):191-197. 被引量:41
  • 3黄辰林,赵辉,胡华平.基于分布自治代理的层次入侵检测系统设计[J].计算机工程与应用,2001,37(6):47-49. 被引量:12
  • 4马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 5.[EB/OL].http ://tech.sina.com.cn,2002-06.
  • 6White GB, Fisch EA, Pooch UW.Cooperating security managers : a peer-based intrusion detection system[J].IEEE Network, 1996; 10(1) : 20-23.
  • 7Bishop M.A model of security monitoring[C].In:Proceedings of the 5th Annual Computer Security Applications Conference, 1989:46-52.
  • 8GSI/FBI.Issues and Trends: 1999 CSI/FBI Computer Crime and Security.URL: http ://www.gocsi.com, 1999.
  • 9Curtisdalton Getting Personal Witting Personal with Fire walls[J]. Network Magazine ,2001 ; 16( 1 ) : 102-106.
  • 10Eskin E.Anomaly detection over noisy data using learned probability data using learned probability distributions[C].In :proceedings of the International Conference on Machine Learning,2000.

二级参考文献22

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8Puketza N,IEEE Software,1997年,14卷,5期,43页
  • 9Puketza N J,IEEE Transactionson Software Engineering,1996年,22卷,10期,719页
  • 10Chen S S,The 19th National Information Systems Security Conference,1996年

共引文献516

同被引文献12

  • 1范明 孟小峰.数据挖掘概念与技术[M].北京:机械工业出版社,2001..
  • 2B Mukherjce,T L heberlein,K N Levill. Network intrusion detection[J].IEEE Network, 1994;8(3) :26~41
  • 3Denning Dorothy E(SRI Intemational).An Intrusion ModeI[J].IEEE Transactions on Software Engineering (SE- 13 ), 1987; 2: 222~232
  • 4Cooper G F,Herskovtis E.A Bayesian method for the induction of probabilistic network from data.Machine Learning,1992(10)
  • 5Curtisdalton Getting Personal Witting Personal with Fire walls[J].Network Magazine,2001,16 (1):102 ~ 106
  • 6http://tech.sina.com.cn 2003/10/20 14:55
  • 7Anomaly E E.Detection over noisy data using learned probability data using learned probability distributions[A].In:Proceedings of the International Conference on Machine Learning,2000
  • 8Lam W,Bacchus F.Learning Bayesian belief networks:An approach based on the MDL principle.Com.Int,1994(10)
  • 9马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 10黄辰林,赵辉,胡华平.基于分布自治代理的层次入侵检测系统设计[J].计算机工程与应用,2001,37(6):47-49. 被引量:12

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部