期刊文献+

基于有色Petri网和移动Agent的网络入侵检测系统 被引量:1

Network Intrusion Detection System Based on CPN and Mobile Agent
下载PDF
导出
摘要 介绍了用有色Petri网的理论对分布式网络入侵行为检测进行建模,并采用移动Agent技术来实现的方法。整个系统具有匹配能力强、扩展性好、分布式运算的特点。 A mothod about Coloured Petri net is introduced to modeling the action of network intrusion detection and is implemented by mobile agent technology. All the system has the characteristic of strong matching ability, good expansibility and distributed computation.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第16期106-108,共3页 Computer Engineering
关键词 有色PETRI网 移动AGENT 入侵检测系统 Coloured Petri net Mobile agent Intrusion detection system
  • 相关文献

参考文献6

  • 1StevensWR.TCP/IP详解(卷1)[M].北京:机械工业出版社,2000..
  • 2黄雷.一种基于移动代理的入侵检测系统[J].情报探索,2001(3):13-15. 被引量:3
  • 3袁崇义.Pctr原理[M].北京:电子工业出版社,1998..
  • 4袁崇义.Pctri原理[M].北京:电子工业出版社,1998..
  • 5Slagell M, MAIDS Design and Implementation, http://latte.cs.iastate.edu/Research/Intrusion/.
  • 6Jensen K.An Introduction to the Practical Use of Coloured Petri Nets.http://www.daimi.aau.dk/-kjcnsen/papers_books/ree_papers_books.html.

二级参考文献3

  • 1[1]Robert S.Gray,David Kotz and Ronald A.Peterson . Mobile -Agent versus Client/Server Performance:Scalability in an Information-Retrieval Task (Dartmouth College Computer Science Technical R eport ).2000, http://www.cs.dartmouth.edu/reports/abstracts/TR2001-386, 2001 /6
  • 2[2]Gray R S. Agent Tcl: a flexible and secure mobile agent system. In: Proceeding s of the 4th Annual Tcl/Tk Workshop. 1996. 9~23. http://www.cs.dartmouth. edu/reports/abstracts/TR98-327,2001/6
  • 3[3]Tao Xianping, Lü Jian, Dong Huan et al. Mobile agent: one of the mai n paradigm of future distributed computing. Computer Science, 1999,26(2):1~6

共引文献4

同被引文献9

  • 1薛静锋,曹元大.Petri网在IDS中的应用研究[J].计算机工程,2004,30(15):117-119. 被引量:3
  • 2鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 3Kumar S. , Spafford E. H.. A pattern matching model for misuse Intrusion detection. In: Proceedings of the 17th National Computer Security Conference, Baltimore, Maryland, 1994,11-21
  • 4Kumar S. , Spafford E. H.. An application of pattern matching in Intrusion detection. Department of Computer Sciences, Purdue University: Technical Report 94-013, 1994
  • 5Kumar S.. Classification and detection of computer Intrusions[Ph. D. dissertation]. Department of Computer Science, Pu-due University, 1995
  • 6Mark S.. The design and implementation of MAIDS (multiagents for Intrusion detection system). Department of Computer Science, Iowa State University, Ames, IA, USA: Technical Report 01-07, 2001
  • 7Manna Z. , Pnueli A.. The Temporal Logic of Reactive and Concurrent Systems: Specification. New York: Springer-Ver-lag, 1992
  • 8Colin S.. Modal and temporal logics. In: Abramsky S. , Gabby D. M. , Maibaum T. S. E. eds.. Handbook of Logic in Computer Science, Oxford, 1992, 2:477-563
  • 9....http://www. ll. mit. edu/IST/ideval/data/2000/2000_ data_index.html,,..

引证文献1

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部