期刊文献+

一个基于移动代理的分布式入侵检测系统 被引量:13

Design and Implementation of a Distributed Intrusion Detection Based on Mobile Agents
下载PDF
导出
摘要 将新型分布式处理技术 - - -移动代理与入侵检测融为一体 ,提出了一种基于移动代理的分布式入侵检测系统 (DIDS)的模型 ;实现了基于此模型的分布式入侵检测系统 ;采取了一些防范措施来保证分布式入侵检测系统自身的安全 ;模拟入侵实验表明它能够有效地检测来自网络内外的入侵 ,并具有良好的灵活性、鲁棒性和可扩展性 . In this paper, the model of DIDS is described and DIDS based on the model is implemented. In addition, the several measures for the security of DIDS are used. The simulating intrusion experiments have shown that the proposed DIDS are very good to prevent from both external and the internal intrusions. Therefore, The DIDS has advantages of flexibility, robustness and scalability.
出处 《小型微型计算机系统》 CSCD 北大核心 2004年第2期192-194,共3页 Journal of Chinese Computer Systems
基金 安徽省自然科学基金 (0 0 0 43 10 5 )资助
关键词 安全 分布式入侵检测系统 移动代理 security distributed intrusion detection system mobile agents
  • 相关文献

参考文献4

二级参考文献26

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980.
  • 9[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232.
  • 10[3]Biswanath, Mukherjee, Heberlein, L.Todd. Network intrusion detection. IEEE Network, 1994,8(3):26~41.

共引文献147

同被引文献46

引证文献13

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部