期刊文献+

一种基于Agent的入侵检测系统模型 被引量:2

A Model of Intrusion Detection System Based on Agent
下载PDF
导出
摘要 分布式入侵检测有利于集各种检测方法之长,从而提高检测效率和准确性,是入侵检测的新思路。文章总结现有分布式入侵检测系统的优缺点,结合Agent的有关理论,提出一种入侵检测系统,此系统具有较高的可靠性、可用性、准确性和适应性。 Distributed intrusion detection is in favor of collecting good qualities of different detection methods.It can in-crease the efficiency and veracity of detection.This paper proposes a new distributed intrusion detection system based on A-gent that has the superior quality of reliability,usability,veracity,flexibility.
机构地区 合肥工业大学
出处 《微电子学与计算机》 CSCD 北大核心 2004年第2期55-57,62,共4页 Microelectronics & Computer
关键词 入侵检测系统 生物体免疫系统 网络安全 AGENT 计算机网络 Intrusion detection,Agent,Mobile Agent,Multi-Agent system
  • 相关文献

参考文献6

二级参考文献37

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8Debar, Hervé and Dacier et al. Towards a Taxonomy of Intrusion Detection Systems. Zurich, Switzerland, IBM Research, 1998(http: ∥www. zurich. ibm. com/).
  • 9T H Ptacek and T N Newsham. Insertion, evasion, and denial of service: Eluding Network Intrusion Detection.Technical report, Secure Networks Inc., January 1998.
  • 10http:∥www. phrack. org.

共引文献541

同被引文献17

  • 1韩景灵,孙敏.一种改进的基于Agent的分布式入侵检测系统[J].电脑开发与应用,2007,20(1):19-20. 被引量:1
  • 2[2]Cohen P R,Levesque H J.Intention is choice with commitment[J].Artificial Intelligence,Swecden:Stockhlom,1990,42(3):213-261.
  • 3[3]Konolige K,Pollack M E.A respresentationalist theory of intention[M] //Bajcsy Red.Proceedings of the 13th International Joint Conference on Artificial Intelligence.San Mateo,CA:Morgan Kaufmann Publishers,1993:390-395.
  • 4[4]Jennings N R.Agent-Based Computing:Promise and Perils.IJCAI-99[C].Sweeden:Stoekhlom,1999:1429-1436.
  • 5[5]Haddadi A S.Communication and Cooperationin Agent Systems[M].Berlin:Springer-Vedag,1996:1-134.
  • 6[6]Dunin-Kepliez B,Verbrugge R.Collective Commitments[M]//Duffee F.Proceedings of the 2nd International Conference on Multi-Agent Systems.Menlo Park,CA:AAAI Press,1996:56-63.
  • 7[11]Shapley L S.A value for n-person games[M] //Kuh H,Tucker A.Contributions to the Theory of Games.New Jersey:Princeton University Press,1953:307-317.
  • 8毛新军,王怀民,陈火旺,刘风歧.多Agent系统的非终止主动合作计算模型[J].计算机研究与发展,1999,36(7):769-775. 被引量:17
  • 9徐晋晖,石纯一.一种基于等价的联盟演化机制[J].计算机研究与发展,1999,36(5):513-517. 被引量:16
  • 10陈建中,刘大有,唐海鹰,胡明.支持多Agent通信的扩展BDI逻辑[J].软件学报,1999,10(7):778-784. 被引量:15

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部