期刊文献+

基于多Agent的可控网络安全系统研究 被引量:2

Research on controllable network security system based on multi-agent
下载PDF
导出
摘要 移动安全Agent扫描各客户主机的漏洞,采集记录异常活动的审计日志,实现事前和事后的安全保障,但移动Agent自身的通信和迁移的安全性同样重要。首先结合硬件特征属性密钥和用户信息,实现基于Agent技术的多因素认证系统,在认证基础上,利用非对称加密技术和密钥管理,保障Agent通信和迁移的安全性。Agent作为软件,容易受到外部破坏,采用检测代理,通过Agent的协作,利用地址解析协议对网内节点的扫描,将广域网扫描机制转化为简单易行的内网扫描,从而保障客户主机中认证Agent的部署可靠性。实验结果表明,该系统效率高,可扩展性、通用性好。 Mobile security agents scan the vulnerabilities, gather the auditing logs, and implement the preactive and postactive security tasks, but it's also necessary to guarantee the communication and mobility security for agent it-self. With the hardware characteristics, asymmetric encryption algorithm and user privacy, the multi-factor authentication is implemented based on agent, which guarantees the communication security. Agent is easily hit from the outside, so the scanning agent detects the network inner nodes using ARP protocol, which induces an applicable scanning method, and provides a feasible approach to guarantee the deployment of the multi-agent platform. The results obtained from experiments show that the system is high efficiency, extensible and open.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2008年第6期1163-1167,共5页 Systems Engineering and Electronics
关键词 网络安全 安全服务 多智能体系统 移动安全智能体 network security security service multi-agent system mobile security agent
  • 相关文献

参考文献10

二级参考文献18

  • 1陈辉,陶洋.基于WinPcap实现对ARP欺骗的检测和恢复[J].计算机应用,2004,24(10):67-68. 被引量:22
  • 2杜春燕,黄宪,陆建德.一种改进的基于PKI/ECC的IKE协议设计[J].微电子学与计算机,2006,23(5):72-75. 被引量:4
  • 3Richardson R. Computer crime and security survey[M]. San Francisco: CSI, 2003. 被引量:1
  • 4Nagar R. Windows NT file system internals: a developers guide[M]. San Francisco: O′Rrilly & Associates, 1997. 被引量:1
  • 5Aki Niemi. Authentication, authorization and accounting in session initiation protocol networks[D] . Helsinki: Department of Electrical and Communications Engineering, Helsinki University of Technology, 2002. 被引量:1
  • 6http://www. nacs. uci. edu/indiv/ehood/MIME/MIME. html 被引量:1
  • 7Bell T, Adjeroh D & Mukherjee, A. (2001). Pattern matching in compressed texts and images[Z]. Draft of May 23, 2001(Submitted to ACM Computing Surveys). 被引量:1
  • 8Boyer R S & Moore J S. A fast string searching algorithm[J].Communications of the ACM, 1977,20 (10): 762-772. 被引量:1
  • 9Knuth D E, Morris Jr J H & Pratt V R. Fast pattern matching in strings[J]. SIAM Journal of Computing,1997, 6(1):323-350. 被引量:1
  • 10Robert Zuccherato.Using A PKI Based Upon Elliptic Curve Cryptography.http://www.entrust.com.2003 被引量:1

共引文献14

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部