期刊文献+

基于移动Agent的分布式入侵检测系统设计与实现

The Research and Implement of Distributed Intrusion Detection System Based on Mobile Agent
下载PDF
导出
摘要 给出了改进的基于实验性移动Agent的入侵检测系统(MADIDS)模型,在该模型的基础上给出系统模型实现的设计要点和思路,并提供了实验结果参数的对比图,从中得出基于移动Agent技术的入侵检测系统能够很好的弥补传统分布式入侵检测系统的弱点,具有广泛的市场前景. This paper gives an improvement of experimental model for Distributed Intrusion Detection System Based on Mobile Agent,and not only the key points on system design but also the contrast of experimental parameters is presented.It is concluded that DIDS can surmount the defects existed in traditional intrusion detection systems and have extensive business foreground.
作者 季秀兰
出处 《甘肃联合大学学报(自然科学版)》 2011年第5期52-56,64,共6页 Journal of Gansu Lianhe University :Natural Sciences
关键词 入侵检测 移动AGENT 分布式 MADIDS intrusion detection mobile agent distributed MADIDS
  • 相关文献

参考文献5

二级参考文献24

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html 被引量:1
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370 被引量:1
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48 被引量:1
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23 被引量:1
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96 被引量:1
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997 被引量:1
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997 被引量:1
  • 8[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980. 被引量:1
  • 9[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232. 被引量:1
  • 10[3]Biswanath, Mukherjee, Heberlein, L.Todd. Network intrusion detection. IEEE Network, 1994,8(3):26~41. 被引量:1

共引文献491

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部