期刊文献+

多Agent技术在入侵检测中的应用 被引量:2

Application of Multi-Agent in Intrusion Detection Model
在线阅读 下载PDF
导出
摘要 计算机应用日趋广泛与深入,从基本的信息共享到各种通信交流活动,无一不受到网络的影响。计算机系统的安全问题更加突出与复杂,传统的单一体系结构的入侵检测系统已不能很好地解决目前出现的安全问题。文中探讨了多Agent的优点并在多Agent技术的基础上建立了一个基于多Agent的入侵检测系统模型。测试的数据显示该系统模型具有防范攻击和较好的容错性。 With the more and more widely and deeply using of computer,everything is influenced by the network not only the basic information sharing but also the communication with others. The security of the computer systemis outstanding and complicated. The traditional and single IDS can't effectively resolve the secure problem which come forth recently. In this paper discuss the advantage of multi-Agents and set up a multi-Agents based on intrusion detection model.The data in the test shows that the system can deal with the intrusion and the mistake.
出处 《微机发展》 2003年第12期50-52,共3页 Microcomputer Development
  • 相关文献

参考文献4

二级参考文献14

  • 1[1]Harrison C G, Chess D M. Mobile Agent: Are They Good Idea?IBM Research Report,1995
  • 2[2]David K, Robert S G. Mobile Agents and the Future of the Internet. ACM Operating System Review, 1999-08:7-13
  • 3[3]Sander T, Christian F T. Mobile Agent and Security. Spriner Verlag Lecture Notes in Computer Science #1419, 1998-06
  • 4[4]Tripathi A R, Karnik N M. Protected Resource Access for Mobile Agent-based Distributed Computing. Proceedings of the 1998 ICPP Workshop on Wireless Networks and Mobile Computing.IEEE Computer Society, 1998-08: 144-153
  • 5[5]Greenberg M S, Byington L C, Harper D G. Mobile Agents and Security. IEEE Communications Magazine, 1998, 36(7): 76-85
  • 6Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 7刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 8Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 9Bian Zhaoqi,Pattern Recognition,1988年
  • 10边肇祺,模式识别,1988年

共引文献394

同被引文献10

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部