期刊文献+

分布式环境中的入侵检测与安全策略研究

Research on Intrusion Detection and Security Policy for Distributed Environments
在线阅读 下载PDF
导出
摘要 提出在分布式系统中的一种新的入侵检测方法和安全策略架构。该解决方案能够保证安全策略的一致性,有效阻止对本地策略的偶然或恶意更改。方案采用两层入侵检测机制保证分布式策略的完整性和一致性,在容错性和应对DoS攻击方面具有良好的表现。该方法能够提高大规模系统的安全性。 This paper presents a novel intrusion detection approach and infrastructure to enforce the security within a distributed system. The solution guaranties the consistency of the security policy and prevents any accidental or malicious update efficiently. Two levels of intrusion detection are proposed to guaranty the integrity and the consistency of the distributed policy. The solution is more robust in terms of fauh-tolerance and resists to denial of service attacks. This approach enforces the security of large scale systems.
作者 舒丹
出处 《计算机与现代化》 2009年第5期96-98,共3页 Computer and Modernization
关键词 分布式环境 安全策略 入侵检测 distributes environment security policy intrusion detection
  • 相关文献

参考文献13

  • 1刘衍珩,田大新,余雪岗,王健.基于分布式学习的大规模网络入侵检测算法[J].软件学报,2008,19(4):993-1003.
  • 2Abdoul K G,Julien B,Renaud B,et al.A global security architecture for intrusion detection on computer networks[J].Computers & Security,2008,27(1-2):30-47.
  • 3Arturo S,Daniel K.Multi-agent Reinforcement Learning for Intrusion Detection[J].Springer Berlin,2008:211-223.
  • 4Keunsoo L,Juhyun K,Ki H K,et al.DDoS attack detection method using cluster analysis[J].Expert Systems with Applications.2008,34(3):1659-1665.
  • 5Hulisi O,Huseyin C Srinivasan R.Intrusion-detection policies for IT security breaches[J].Informs Journal on Computing,2008,20(1):112-123.
  • 6Tao P,Christopher L,Kotagiri R.Information sharing for distributed intrusion detection systems[J].Journal of Network and Computer Applications,2007,30(3):877-899.
  • 7Inverardi P,Mostarda L.A Distributed Monitoring System for Enhancing Security and Dependability at Architectural level[M].Springer Berlin,2007:210-236.
  • 8Fessi B A,Hamdi M,et al.A decisional framework system for computer network intrusion detection[J].European Journal of Operational Research,2007,177(3):1824-1838.
  • 9Blanc M,Briffaut J Lalande FJ,et al.Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach[C]//POLICY'06,IEEE,2006:153-156.
  • 10Blanc M,Briffant J,Lalande J F,et al.Collaboration between MAC policies and IDS based on a meta-policy approach[C]//CTS'06IEEE,2006:48-55.

二级参考文献2

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部