期刊文献+

基于Agents网络入侵检测系统的研究 被引量:1

Research of Agents-based Network Intrusion Detection System
在线阅读 下载PDF
导出
摘要 分析了一般入侵检测系统某些方面的弱点,描述了基于Agents网络入侵检测系统在数据采集和数据分析方面的优势,介绍了一种基于Agents网络入侵检测系统模型,并提出其存在的不足和几点改进意见。 Analyses the weakness of the functions of the ecumenical intrusion detection system and describes the advantages of Agentsbased network intrusion detection system on two sides--data analysis and data acquisition.The paper also introduces a model of Agentsbased network intrusion detection system and points out its deficiency and some advices.
作者 马颖
出处 《计算机与现代化》 2003年第2期56-57,61,共3页 Computer and Modernization
关键词 AGENTS 网络入侵检测系统 网络安全 防火墙 计算机网络 Agent IDS network intrusion detection system
  • 相关文献

参考文献2

二级参考文献16

  • 1[1]S.M.Bellovin.Security problems in the TCP/IP protocol suite[J].Computer Communication Review, 1989,19(2):32-48.
  • 2[2]R.Heady, G.Luger, A.Maccabe, et al.The architecture of a network level intrusion detection system[R].Technical Report, University of New Mexico, Department of Computer Science, August 1990.
  • 3[3]B.Mukherjee, Todd L.Heberlein, Karl N.Levitt.Network Intrusion Detection[J].IEEE Network,,May/June 1994,8(3): 26-41.
  • 4[4]Phil Porras, Dan Schnackenberg, Stuart Staniford-Chen.The Common Intrusion Detection Framework Architecture[EB/OL].http://www.gidos.org.
  • 5[5]Thomas H.Ptacek, Timothy N.Newsham.Insertion, evation, anddenial of service: Eluding network[R].Technical report, Secure Networks, Inc., January 1998.
  • 6[6]S.Staniford-Chen, S.Cheung, R.Crawford, et al.GrIDS: A graph based intrusion detection system for large networks[C].In Proceedings of the 19th National Information Systems Security Conference, volume 1.National Institute of Standards and Technology, October 1996.361-370.
  • 7[7]Gregory B.White, Eric A.Fisch, Udo W.Pooch.Cooperating securitymanagers: A peer-based intrusion detection system[J].IEEE Network, January/February 1996:20-30.
  • 8[8]Mark Crosbie, Gene Spafford.Defending a Computer System usingAutonomous Agents[R].COAST Technical Report No.95-022,March 1994.
  • 9[9]Mark Crosbie, Gene Spafford.Active Defense of a Computer Systemusing Autonomous Agents[R].COAST Technical Report No.95-008, February 1995.
  • 10[10]Jeffrey M.Bradshaw.An Introduction to software agents[M].AAAiPress/The Mit Press, 1997.

共引文献2

同被引文献1

  • 1[5]Corey V.Network Forensics Analysis[J].IEEE Internet Computing,2002.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部