期刊文献+

基于Snort的分布式协作入侵检测系统 被引量:5

Distributed Cooperative Intrusion Detection System Based on Snort
下载PDF
导出
摘要 基于Snort设计一个分布式协作入侵检测系统。将感性信任理论和反馈思想相结合,减小系统误判断的几率,提升系统的自适应能力。给出协作节点间的数据传输协议、基于感性信任的协作机制及信任度更新算法。通过模拟攻击对系统进行测试,结果证明,节点间可以实现对等协作,有效避免协作过程中误判断的发生。 Based on Snort,this paper presents a Distributed Cooperative Intrusion Detection System(DCIDS).Through introducing subjective trust theory and feedback theory into cooperative detection,the system reduces the probability of misjudge,and improves self-adapting capability.It introduces transmission protocol between nodes,and proposes the cooperative scheme and the trust level update algorithms.The system is tested by simulated intrusion,and result shows that it completes the cooperative detection,and reduces the probability of misjudge properly.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第19期165-167,共3页 Computer Engineering
基金 上海市自然科学基金资助项目(08ZR1400400) 上海市教育发展基金会晨光计划基金资助项目(2007CG42)
关键词 入侵检测系统 分布式 协作 感性信任 Intrusion Detection System(IDS) distributed cooperative subjective trust
  • 相关文献

参考文献4

  • 1姜华斌,江文,谢冬青.一种基于环形结构的新型分布式入侵检测模型[J].计算机工程,2005,31(23):143-145. 被引量:2
  • 2Razak S A, Fumell S M, Clarke N L, et al. Friend-assisted Intrusion Detection and Response Mechanisms for Mobile Ad Hoc Networks[J]. Ad Hoc Networks, 2008, 6(7): 1151-1167. 被引量:1
  • 3Gambetta D. Can We Trust Trust?[M]//Blackwell B. Trust: Making and Breaking Cooperative Relations. [S. l.]: Oxford, 1990: 213-237. 被引量:1
  • 4林宇,郭凌云编著..Linux网络编程[M].北京:人民邮电出版社,2000:498.

二级参考文献9

  • 1James E Anderson Computer Security Thread Monitoring and Surveillance[R]. Technical Report. James P Anderson Co., Fort Washington, Pennsylvania, 1980. 被引量:1
  • 2Chen S, Tung B, Schnackenberg D. The Common Intrusion Detection Framework-data Formats[EB/OL].Internet Draft Draft-ietf-cidf-data-formats-00. Txt, 1998. 被引量:1
  • 3Timmis J, Knight T. Artificial Immune System: Using the Immune System as Inspiration for Data Mining[C]. Hershey: Idea Publishing Group, 2001:209-230. 被引量:1
  • 4Nolfi S, Florano E Learning and Evolution[J]. Autonomous Robots,1999,7(1):89-113. 被引量:1
  • 5Polla D, McConnell J, Johnson T, et al. A Framework for Cooperative Intrusion Dection[C]. 21^th National Information Systems Security Conference, 1998. 被引量:1
  • 6Janakiraman R, Waldvogel M, Zhang Q. lndra:A Peer-to-Peer Approach to Network Intrusion Detection And Prevemion[C]. In:Proceedings of IEEE WETICE 2003 Workshop on Enterprise Security.Linz, Austria, 2003-06. 被引量:1
  • 7Ning E Wang X, Jajodia S. Modeling Requests Among Cooperating Intrusion Detection System[J]. Computer Communications, 2002,23 (7):702-1715. 被引量:1
  • 8马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 9李旺,吴礼发,胡谷雨.分布式网络入侵检测系统NetNumen的设计与实现[J].软件学报,2002,13(8):1723-1728. 被引量:31

共引文献1

同被引文献38

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部