期刊文献+

基于移动代理的分布式入侵检测系统研究 被引量:3

Distributed Intrusion Detection System Research Based on Mobile Agent
下载PDF
导出
摘要 分析当前入侵检测系统存在的不足。提出将移动代理技术应用到入侵检测系统中,利用MA的移动性、智能性和分布性的优势,提高入侵检测系统的处理效率、自适应性和扩展性,并且减少网络中数据传输量。将Aglet开发环境作为该入侵检测系统的开发平台,将事件处理和数据动态分配到网络各节点,通过自动学习、智能判断,增强系统检测能力。 This paper analyzes the disadvantage of current intrusion detection system. The Mobile Agent technology is applied to intrusion detection system, using MA mobility, intelligent and distributed advantage, to improve the efficiency of intrusion detection systems, adaptability and scalability, and reduce the amount of data transmission in network. At the same time, the Aglet development environment as the intrusion detection system development plat- form, the distribution of event processing and dynamic data to each node in the network, through the automatic learning, intelligent judgment, the system detection ability can be enhanced.
出处 《重庆科技学院学报(自然科学版)》 CAS 2013年第6期143-145,共3页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
基金 安徽高校省级自然科学研究项目(KJ2012Z003)
关键词 移动代理 AGLET 分布式入侵检测 mobile agent Aglet, distributed intrusion detection system
  • 相关文献

参考文献4

  • 1谭湘,顾毓清,包崇明.一种用于移动Agent数据保护的机制[J].软件学报,2005,16(3):477-484. 被引量:8
  • 2Yu Feng,Wang Qian.Research and Implementation of Flexible Workflow Based on Mobile Agent Platform:Aglet.Source:Dongnan Daxue Xuebao (Ziran Kexue Ban)[J].Journal of Southeast University:Natural Science Edition,2003,33 (2):172-176. 被引量:1
  • 3Gupta P,McKeown N.Algorithms for Packet Classification[J].IEEE Network,2001,15 (2):24-32. 被引量:1
  • 4PODLENA J R,HENDTLASS T.An Accelerated Genetic Algorithm[J].Applied Intelligence,1998 (8):103-111. 被引量:1

二级参考文献8

  • 1Jansen W. Countermeasures for mobile Agent security. Computer Communications, 2000,23(10):1667-1677. 被引量:1
  • 2Corradi A, Montanar R. Mobile Agent protection in the Internet environment. In: Gibson RM, ed. Proc. of the 23th Annual Int'l Computer Software and Applications Conf. Los Alamitos: IEEE Computer Society Press, 1999. 80-85. 被引量:1
  • 3Corradi A, Cremonini M. Mobile Agents integrity for electronic commerce applications. Information Systems, 1999,24(6): 519-533. 被引量:1
  • 4Karjoth G, Asokan N, Glc C. Protecting the computation results of free-roaming Agents. In: Rothermel K, Hohl F, eds. Mobile Agents: 2nd Int'l Workshop. London: Springer-Verlag, 1998. 195-207. 被引量:1
  • 5Cheng JSL, Victor KW. Defenses against the truncation of computation results of free-roaming Agents. In: Deng RH, Qing SH, Bao F, Zhou JY, eds. Information and Communications Security. London: Springer-Verlag, 2002. 1-12. 被引量:1
  • 6Wilhelm G, Staamann M. A pessimistic approach to trust in mobile Agent platforms. IEEE Internet Computing, 2000,4(5):40-48. 被引量:1
  • 7Stalling W. Network Security Essentials: Applications and Standards. New York: Prentice Hall, 1999. 119-123. 被引量:1
  • 8Karjoth G, Lange DB, Oshima M. A security model for aglets. IEEE Internet Computing, 1997,1(4):68-77. 被引量:1

共引文献7

同被引文献18

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部