期刊文献+

基于移动代理的分布式入侵检测系统的研究 被引量:5

Research of distributed intrusion detection system based on mobile agent
在线阅读 下载PDF
导出
摘要 分析了现有入侵检测系统的不足,提出了一个基于移动代理的分布式入侵检测系统的模型,对系统中各个组件的功能进行了描述,同时对移动代理的安全问题进行了讨论。该模型采用无控制中心的协作式组件体系结构,完全避免了单点失效问题。移动代理之间各自独立,同时相互通信,协作完成入侵检测任务,真正实现了分布式的检测,增强了系统的灵活性和可扩展性。 The defects of current intrusion detection systems (IDSs) are analyzed. A distributed intrusion detection system model is presented based on the mobile agents, the function of each module in the system is described, and the security problems of mobile agents are discussed. This model adopts the architecture which has no control center, avoids the problem of a single point failure completely. Agents are independent separately, while they can communicate and Cooperate one another to take actions, realizes the distributed detection really, and strengthens flexibility and expansibility of the system.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第18期3328-3330,3363,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2002AA145090 2005AA145110)。
关键词 网络安全 入侵检测 移动代理 分布式 模型 network security intrusion detection mobile agent distributed model
  • 相关文献

参考文献6

  • 1Xiong Jia-jun,Zhang Jing.A kind of multilayer intrusion detection system using mobile agent[C].Proceedings of IEEE the Second International Conference on Machine Learning and Cybernetics,2003.1951-1955.
  • 2Zhong Shao-chun,Song Qing-feng,Cheng Xiao-chun.A safe mobile agent system for distributed intrusion detection[C].Proceedings of IEEE the Second International Conference on Machine Learning and Cybernetics,2003.2009-2014.
  • 3Du Ye,Wang Hui-qiang,Pang Yong-gang.Design of a distributed intrusion detection system based on independent agents[C].Proceedings of IEEE International conference on intelligent sensing and information processing,2004.254-257.
  • 4陆骏,王凯,吕志军,黄皓.一种基于移动代理技术的入侵检测系统模型[J].计算机工程与应用,2003,39(28):167-169. 被引量:6
  • 5姜学明,冯志勇,周玉清.如何防止移动代理和代理平台之间的相互攻击[J].计算机工程与设计,2004,25(1):78-80. 被引量:2
  • 6刘振鹏,杨绍芸,张寿华,周特.一种基于分布式入侵检测的计算机免疫模型[J].计算机工程与设计,2004,25(11):1912-1913. 被引量:4

二级参考文献13

  • 1米凯利维茨Z 周家驹(译).演化程序--遗传算法和数据编码的结合[M].北京:科学出版社,2000..
  • 2J S Balasubmmaniyan,J Q Garcia-Femandez.An architecture for intrusion detection using autonomous agents[C].In: 14th IEEE Computer Security Applications Conference,1998-12.
  • 3M C Bemardes,E dos Santos Moreira.Implementation of an intrusion detection system based on mobile agents[C].In:Intemational Symposium on Software Engineering for Parallel and Distributed Systems, 2000:158-164.
  • 4M Asaka,A Taguchi,S Goto.The implementation of IDA:An intrusion detection agent system[C].In:Proceedings of the 11th FIRST Conference, 1999-06.
  • 5Christopher Krtigel,Thomas Toth.Applying mobile agent technology to intrusion detection[C].In:ICSE Workshop on Software Engineering and Mo-bility, 2001.
  • 6J D de Queiroz,L F R da Costa Carmo,L Pirmez Micael.An autonomous mobile agent sys-tem to protect new generation networked applications[C].In:2nd Annual Workshop on Recent Advances in Intru-sionDetection,Rio de Janeiro.Brasil. 1999--09.
  • 7W Jansen,T Karygiannis.Mobile agents and security.Special Publication 800-19,NIST, 1999-09.
  • 8W Jansen,P Mell Karygiannis,D Marks.Mobile agent in intrusion detection and response[C].In:12th Annual Canadian Information Technology Security Symposium,Ottawa,Canada,2000-.06.
  • 9W Jansen,P Mell Karygiannis,D Marks.Applying mobile agents to intrusion detection and response[R].Interim Report ( IR )6416, NIST, 1999-10.
  • 10Thomas H Ptacek,Timothy N Newsharn.Insertion,Evasion,and Denial of Service:Eluding Network Intrusion Detection[M].Secure Networks, Inc, 1998-01.

共引文献9

同被引文献30

  • 1徐小龙,王汝传.移动代理安全机制的研究[J].计算机工程与应用,2004,40(22):6-9. 被引量:6
  • 2李培,武丽辉.基于移动代理的分布式信息检索[J].现代图书情报技术,2004(10):55-59. 被引量:6
  • 3张琴,黄敏,曹谢东,朱海栋,曹蕾.基于移动计算的移动代理平台的实际应用[J].微计算机信息,2006,22(10X):242-244. 被引量:2
  • 4魏宇欣,武穆清.智能网格入侵检测系统[J].软件学报,2006,17(11):2384-2394. 被引量:12
  • 5Chess D, Harrison C, Kershenbaum A.Mobile Agents: Are they a good idea?[R].IBM Research Report, J.Watson Research Center, 1995.
  • 6Farmer W M, Guttmann J D, Swamp V. Security for mobile Agents: Authentication and state appraisal [C]. Proceedings of the Fourth European Symposium on Research in Computer Security,1996:118-130.
  • 7Farmer W M,Guttmann J D,Swarup V.Security for mobile Agents: Issues and requirements [C].Proceedings of the 19th National Information Systems Security Conference, 1996(2):591-597.
  • 8Vigna G.Protecting mobile Agents through tracing [C].Finland: Proceedings of 3rd Workshop on Mobile Object Systems, 1997.
  • 9Vigna G.Crytographic traces for mobile Agents, Mobile Agents and security[J].Lecture Notes in Computer Science, 1998(1419): 137-153.
  • 10Hohl F.An approach to solve the problem of malicious hosts in mobile Agent systems [C]. Proceedings of 4th ECOOP Workshop on Mobility: Secure Internet Mobile Computations, 1998.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部