期刊文献+

预警信息发布算法的研究与实现

THE STUDY AND REALIZATION OF EARLY WARNING INFORMATION PUBLICATION ALGORITHM
下载PDF
导出
摘要 提出了网络安全预警系统中量大—频率高型预警信息的发布算法,该算法将直接由预警代理发布预警信息的方式转变为预警代理首先发布下载元数据,由本地扫描系统根据元数据选择下载节点的分块P2P的下载方式。采用该算法可以降低预警信息发布时预警代理的负载,缩短预警信息发布的时间。 In this paper,an information publication algorithm is presented,which can deal with early warning information of large-amount and high-frequency in NSEWS. In this algorithm, instead of directly publishing early warning information,warning agents publish corresponding meta-data firstly. Then according to the meta-data,local scanners choose some downloaders to get early warning information, using a way of P2P block-division downloading. By used this algorithm, the load of warning agent can be reduced when the early warning information is published, and the time of publication can also be shortened.
出处 《计算机应用与软件》 CSCD 北大核心 2006年第10期116-117,共2页 Computer Applications and Software
关键词 网络安全预警 信息发布 扫描系统 P2P技术 Network security early warning (NSEW) Information publication Scanner system P2P technology
  • 相关文献

参考文献6

二级参考文献13

  • 1Rathmell A,Dorschner J,Knights M,et al. Summary of Research Results:Threat Assessment and Early Warning Methodologies for Information Assurance[EB/OL]. http://www.iaac.org.uk/Publications/ROPA/Website%20summary.pdf,2003. 被引量:1
  • 2Rathmell A,Overill R,Valeri L. Information Warfare Attack Assessment System[EB/OL]. http://www.kcl.ac.uk/orgs/icsa/Old/iwaasppr.PDF,2003. 被引量:1
  • 3Eskin E,Miller M,et al. Adaptive Model Generation for Intrusion Detection Systems[EB/OL]. http://www.cs.columbia.edu/ids/FCblications/adaptive-ccsids00.pdf,2003. 被引量:1
  • 4Lee W,Stolfo SJ,et al. Real-Time Data Mining-based Intrusion Detection[EB/OL]. http://www.cs.columbia.edu/ids/concept/,2003. 被引量:1
  • 5Lee W,Stolfo SJ,Mok K. Data mining in work flow environments:Experiences in intrusion detection[A]. Proceedings of the 1999 conference on Knowledge Discovery and Data Ming(KDD-99)[C]. 1999. 被引量:1
  • 6Warrender C,Forrest S,Pearlmutter B. Detecting intrusions using system calls:alternative data models[A]. Proceedings of the 1999 IEEE Symposium on Security and Privacy[C]. IEEE ComFCter Society,1999. 133-145. 被引量:1
  • 7Yau SS,Zhang XY. ComFCter network intrusion detection,assessment and prevention based on security dependency relation[EB/OL]. http://dlib.comFCter.org/conferen/compsac/0368/pdf/03680086.pdf,2003. 被引量:1
  • 8王宇,李增智,薛文革,杨振江.以网络为核心的计算构架Jini技术剖析[J].计算机应用研究,2001,18(1):89-91. 被引量:1
  • 9段海新,吴建平.计算机网络的一种实体安全体系结构[J].计算机学报,2001,24(8):853-859. 被引量:28
  • 10宣蕾,苏金树,苗青,张怡.网络安全战略预警系统研究[J].通信技术,2001,34(7):90-92. 被引量:4

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部