期刊文献+

基于HLA的分布式入侵检测系统仿真设计

Design of Distributed Intrusion Detection Simulation Based on HLA
下载PDF
导出
摘要 分布式入侵检测系统(DIDS)是一种分布于网络环境的入侵检测系统,随着网络环境的日益复杂化,DIDS的设计任务也日趋繁重,对系统的仿真是其规划和设计的首要任务。高层体系结构(HLA)是当今世界上非常流行的分布式仿真技术之一,它建立了一个通用的仿真技术框架。基于HLA的仿真应用系统的设计,已经成为当前的研究热点。分析了HLA和DIDS的基本框架,以HLA为基础,借用相关辅助设计软件,对分布式入侵检测系统进行了仿真设计。通过仿真,较好地解决了分布式入侵检测系统的规划和设计方案的复杂性问题,为进一步的实际开发和应用提供了可靠的依据。 Distributed intrusion detection system (DIDS) is a kind of intrusion detection system to distribute in the network environment. Along with the network environment complicating increasingly, the DIDS design mission is also gradually heavy, Simulated to the system is programming and design of chiefly mission. High level architecture (HLA) is one of the simulation techniques that spreads very much in the world nowadays, it build up a universal simulation technique frame. Design of simulation application system based on HLA, already becomes current popular research. In this paper, analyzed the basic frame of the HLA and DIDS, with HLA for foundation, using the related assistance design software, simulated design distributed intrusion detection system Through simulating, the complexity problem of project of programming and design of distributed intrusion detection system got to resolve. A dependable basis for the further actual development and application was provided.
作者 屈长青
出处 《湖南科技学院学报》 2007年第4期34-36,共3页 Journal of Hunan University of Science and Engineering
关键词 高层体系结构 分布式入侵检测系统 仿真 设计 HLA DIDS Simulation Design
  • 相关文献

参考文献6

二级参考文献29

  • 1王文悦,郭齐胜.基于HLA的坦克作战仿真系统初探[J].系统仿真学报,2001,13(S2):405-407. 被引量:4
  • 2周忠,段作义,王璐.HLA体系中盟员与RTI的通信实现[J].系统仿真学报,2001,13(S2):426-428. 被引量:8
  • 3[1]DMSO.High Level Architecture Run-time Infrastructure Programmer's Guide [EB/OL].http://www.dmso. mil,2002-08 被引量:1
  • 4[2]Gan Boon Ping. Distributed Supply Chain Simulation[EB/OL].http://sentosa.sas.ntu.edu.sg,2002-06 被引量:1
  • 5[3]Granowerrer L.Solving the FOM-independence Problem[EB/OL].http://hla. dmso.mil,2002-06 被引量:1
  • 6[4]Schulze T,Strassburger S,Klein U.Traffic Simulation Based on HLA.http://www.in forms-cs.org,2002-06 被引量:1
  • 7[5]Chan A,Spracklen T. Web-based Distributed Object Simulation Framework. http://www.ece.cm u.edu,2002-08 被引量:1
  • 8[1]Anderson C,James P.Computer security threat monitoring and surveillance [M].Fort Washington,1980. 被引量:1
  • 9[2]Denning D E(SRI International).An intrusion detection model [J].IEEE Transactions on Software Engineering(SE- 13),1987,4(2): 222-232. 被引量:1
  • 10[3]Chen S S.Common intrusion detection framework [EB/OL].http:∥www.isi.edu/~brian/cidf/. 被引量:1

共引文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部