期刊文献+

基于SNMP的入侵检测系统的设计与实现 被引量:6

Design and Implementation of a SNMP-based Intrusion Detection System
下载PDF
导出
摘要 将网络管理系统(NMS)与入侵检测系统(IDS)结合,提出了一种分布式入侵检测系统:简单入侵检测系统(Sim-pleIntrusionDetectionSystem简称SIDS),它引入分层过滤、分布处理、自治代理的思想。系统由收集器、分析器等多级实体组成,实体之间采用SNMPV3进行通信。文章还详细讨论了如何用SNMPV3实现SNMP代理与管理者之间高效、安全、可靠的通信问题。 The thesis combines Network Man ag ement System(NMS )with Intrusion Detection System(IDS).the approaches of l ayered filtration,distributed processing,security communication and autonomous agent are adopted to the architecture to put forward a distributed intrusion detection system:simple intrusion detection system(SIDS).The system is compo sed with multistage entities(collector,analyser,etc),the communication amon g them is implemented by SNMPV3.This paper discusses how to implement the hig h-efficient ,safe,reliable communication between SNMP Agent and Manager wit h SN-MPV3in detail.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第17期177-180,共4页 Computer Engineering and Applications
基金 湖北省科技攻关重大项目"网络管理平台软件研究及其产业化"(编号:2001AA104A105) 湖北省自然科学基金资助项目(编号:2001ABB013)
关键词 分层过滤 分布处理 入侵检测系统 NMS SNMPl Layered filtration,Distributed processing,Int rusion Detection System,NMS ,SNMP
  • 相关文献

参考文献9

  • 1马恒太,蒋建春,陈伟锋,卿斯汉.基于Agent的分布式入侵检测系统模型[J].软件学报,2000,11(10):1312-1319. 被引量:122
  • 2段海新,吴建平.一种分布式协同入侵检测系统的设计与实现[J].软件学报,2001,12(9):1375-1379. 被引量:21
  • 3Mark A Miller.用SNMP管理互联网络:第三版[M].中国水利水电出版社,2001.. 被引量:1
  • 4Panagiotis Astithas,Georgios Koutepas,Athanassios Moralis et al.SIDS-A system for enterprise-wide Intrusion Detectio[M].Athens,Greece,2001. 被引量:1
  • 5Balasubramaniyan J S.An Architecture for Intrusion Detection Using Autonomous Agents[R].COAST Techical Report,1998-05. 被引量:1
  • 6Barrus J.A Distributed Autonomous-agent Network-Intrusion Detection and Response System[C].In:Procedings f the 1998 Comnmnd and Control Research and Technology Symposium,Monterey CA, 1998. 被引量:1
  • 7Haining Wang,Danlu Zhang,Kang G Shin.Detecting SYN Flooding Attacks[M].EECS Department,The University of Michigan Ann Arbor, MI,2002:48109-2122. 被引量:1
  • 8An Architecture for Describing SNMP Management Frameworks[S]. RFC2571,1999-04. 被引量:1
  • 9J S Balasubramaniyan,J 0 Garcia-Fernandez,D Isacoff et al.An Architecture for Intrusion Detection using Autonomous Agents[R].Technical Report 98/05,COAST Laboratory,Purdue University,1998---06. 被引量:1

二级参考文献15

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html 被引量:1
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370 被引量:1
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48 被引量:1
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23 被引量:1
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96 被引量:1
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997 被引量:1
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997 被引量:1
  • 8[1]Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, TR80904, Washington: Anderson Co., 1980. 被引量:1
  • 9[2]Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232. 被引量:1
  • 10[3]Biswanath, Mukherjee, Heberlein, L.Todd. Network intrusion detection. IEEE Network, 1994,8(3):26~41. 被引量:1

共引文献136

同被引文献39

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部