期刊文献+

基于自适应Agent的入侵检测系统研究 被引量:8

Study of Intrusion Detection Systems Based on Adaptive Agents
在线阅读 下载PDF
导出
摘要 探讨了利用入侵检测自治代理和自适应模型生成相结合的系统方案,提出了动态逻辑连接的方法,有效降低了系统的配置难Agent度,同时提高了系统运行的可靠性和容错性。 In order to decrease the difficulty of deployment, the scheme of combining AAFID with adaptive model generation is discussed. The method named dynamically logic connections of agents is presented which contributes to improving the reliability and error-tolerance of detection systems.
出处 《计算机工程》 CAS CSCD 北大核心 2002年第7期44-47,共4页 Computer Engineering
基金 国家973资助项目(G1999035801) 国家信息化领导小 组计算机网络系统安全技术研究资助项目研)(20011-08
关键词 自适应AGENT 入侵检测系统 动态逻辑系统 网络安全 计算机网络 Agent AAFID Adaptive model generation Dynamically logic connection
  • 相关文献

参考文献3

  • 1[1]Balasubramaniyan J S, Garcia-Fernandez J O,Lsacoff D.Architecture for Intrusion Detection Using Autonomous Agents. COAST Technical Report, COAST Laboratory, Purdue University, 1998
  • 2[2]Bace R G. Intrusion Detection. Macmillan Technical Publishing, 1999
  • 3[3]Eskin E,Miller M, Zhong Zhida. Adaptive Model Generation for Intrusion Detection Systems. Athens:Workshop on Intrusion Detection and Prevention, 7th ACM Conference on Computer Security, 2000-11

同被引文献37

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2崔宁周,谢维信,余雄南.多传感器检测系统中的次最佳分布式判决融合[J].西安电子科技大学学报,1994,21(2):127-135. 被引量:5
  • 3唐谦,张大方.入侵检测中模式匹配算法的性能分析[J].计算机工程与应用,2005,41(17):136-138. 被引量:21
  • 4毛功萍,熊齐邦.基于策略的入侵防御系统模型的研究[J].计算机应用研究,2006,23(3):126-127. 被引量:11
  • 5王彪.基于网络入侵检测的研究与实现[J].电脑知识与技术,2006(5):39-41. 被引量:2
  • 6Balasubramaniyan J S, Garcia-Femandez J O, Isacoff D, et al.An architecture for intrusion detection using autonomous agent[C]// Computer Security Applications Conference, 1998. Asaka M, Taguchi A, Goto S.The implementation of IDA: an intrusion detection agent system[C]//Proceedings of the llth FIRST Conference, 1999.
  • 7Mei Lijun,Chan W K, Tse T H.A tale ofclouds:paradigm comparisons and some thoughts on research issues[C]//2008 IEEE Asia-Pacific Services Computing Conference,APSCC,2008.
  • 8Debar H, Curry D,Feinstein B.Intrusion Detection Message Exchange Format (IDMEF) data model Extensible Markup Language(XML) document type definition[EB/OL].(2000-07).http:// www.semper.org/idwg-public/0247.html.
  • 9Undercoffer J, Joshi A, Pinkston J.Modeling computer attacks: an ontology for intrusion detection[J].Computer Science,2003,2820: 113-135.
  • 10DALMEIJER M, HAMMER D K, AERT A T M. Mobile Software Agents [J]. Computers in Industry, 2000,41 (3) : 251 - 260.

引证文献8

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部