期刊文献+

移动Agent在入侵检测系统中的应用

在线阅读 下载PDF
导出
摘要 本文简单介绍了移动Agent和入侵检测系统,介绍了基于移动Agent的入侵检测模型,最后提出了一些移动Agent入侵检测系统还存在的一些问题。
作者 郭巍
出处 《中国科技财富》 2008年第10期132-133,共2页 China Science and Technology Fortune Magazine
  • 相关文献

参考文献3

二级参考文献16

  • 1余青霓 王晓程等(译).网络入侵检测分析员手册[M].人民邮电出版社,2000..
  • 2张云勇.面向agent的软件工程:博士生研究报告[M].电子科技大学计算机学院,2000..
  • 32.Smaha S E.Haystack An intrusion detection system.In IEEE Four- th Aerospace Computer Security Applications Conference,USA:Or- lando,FL,Dec.1988
  • 43.Levitt K N,Heberlein L T,Mukherjee B.A method to detect intru- sive activity in a networked environment.In 14th National Computer Security Conference,Washington,DC,USA:Oct.1991:362-371
  • 54.Pagurek B,White T,Bieszczad A.A Network modeling for manage- ment applications using intelligent mobile agents.Journal of Network and Systems Management,September 1999;7(3)
  • 65.Vigna G,Fuggetta A,Picco G P.Understanding code mobility.IEEE TRANSACTIONS On Software Engineering,1998;24(5):342-361
  • 76.Picco G P,Baldi M.Evaluating the tradeoffs of mobile code design paradigms in network management applications.In the 20th Interna- tional Conference on Software Engineering ICSE'98,Kyoto,Japan: IEEE CS Press,April 1998
  • 87.Lane T,Brodley C E.Temporal sequence learning and data reduc- tion for anomaly detection.In Proceedings of the Fifth ACM Confer- ence on Computer and Communications Security,1998:150-158
  • 98.Bishop M,Dilger M.Checking for race conditions in file accesses. Computing Systems,Spring 1996;9(2):131-152
  • 101,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html

共引文献137

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部