期刊文献+

基于Mailbox移动代理的分布式入侵检测系统模型

在线阅读 下载PDF
导出
摘要 文章提出了一种基于Mailbox移动代理的新型分布式入侵检测系统模型,该系统能及时有效地防御分布式入侵攻击和内部攻击对目标主机的破坏,具有实时性强、误报率低等特点。
出处 《计算机与网络》 2004年第1期123-125,共3页 Computer & Network
  • 相关文献

参考文献4

二级参考文献12

  • 1[1]Robert S.Gray,David Kotz and Ronald A.Peterson . Mobile -Agent versus Client/Server Performance:Scalability in an Information-Retrieval Task (Dartmouth College Computer Science Technical R eport ).2000, http://www.cs.dartmouth.edu/reports/abstracts/TR2001-386, 2001 /6
  • 2[2]Gray R S. Agent Tcl: a flexible and secure mobile agent system. In: Proceeding s of the 4th Annual Tcl/Tk Workshop. 1996. 9~23. http://www.cs.dartmouth. edu/reports/abstracts/TR98-327,2001/6
  • 3[3]Tao Xianping, Lü Jian, Dong Huan et al. Mobile agent: one of the mai n paradigm of future distributed computing. Computer Science, 1999,26(2):1~6
  • 4[1]Wayne Jansen, Peter Mell,Tom Karygiannis,Don Marks.Ap-plying Mobile Agents to Intrusion Detection and Response.IST Interim Report (IR)-6416 October 1999 [R]. NIST,1999,2,5-7.
  • 5[2]Todd Sundsted. An introduction to agents [EB/OL]. http://www.javaworld.com/jw-06-1998/jw-06-howto.html, 1998.
  • 6[3]Hyacinith S Nwana. Software Agents: An Overview. Know-ledge Engineering Review[M].Knowledge Engineering Re-view, 1996.
  • 7[4]Jansen W, Mell P, Karygiannis T, Marks D. Mobile Agents inIntrusion Detection And Response [R]. Proceeding of 12thAnnual Canadian Information Technology Security Sympo-sim,Ottawa, Canada,June 2000.
  • 8[5]Mark Slagell. The degsign and Implementation of MAIDS[EB/OL]. http://latte.cs.iastate.edu/ms/cc.html.
  • 9[6]Asaka M,Okazawa S,Taguchi A,Goto S. A Method of Trac-ing Intruders by use of Mobile Agents [J]. INET99, June1999.
  • 10[7]Intrusion Detection Hotlist[EB/OL].July 1998. http://www.cerias.purdue.edu/coast/ids/.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部