期刊文献+

基于Agent技术的入侵检测系统设计与实现 被引量:3

Intrusion detection system design and implementation based on agent technology
在线阅读 下载PDF
导出
摘要 在网络环境下入侵行为开始之前需要获取目标的必要信息,为入侵活动做准备,这就是网络中的早期异常活动。介绍的入侵检测系统是基于Agent技术,具有层次化、模块化的结构,在网络中易于部署,不仅可以检测基于知识的入侵,还可以检测基于行为的入侵,能够对早期的异常活动进行有效的报警和记录。 Intrusion behaviour needs necessary information about the target to be ready for the intrusion activities under network environment before it starts, which are early abnormal activities. It is introduced that a new intrusion detection system is based on agent technology, and it is easily deployed into network because of hierarchical and modular structure. The system can detect intrusions based on misuse and has ability to detect abnormal intrusions, and it can effectively find out early abnormal activities in the network and record the intrusion and alarm.
作者 张庆生
出处 《计算机工程与设计》 CSCD 2004年第11期2067-2069,共3页 Computer Engineering and Design
关键词 入侵检测系统 AGENT技术 入侵行为 基于行为 基于知识 部署 异常 早期 准备 活动 intrusion detection AHIDS structure network agent
  • 相关文献

参考文献9

  • 1杨向荣,宋擒豹,沈钧毅.基于数据挖掘的智能化入侵检测系统[J].计算机工程,2001,27(9):17-18. 被引量:31
  • 2Gordeev Mikhail. Intrusion detection:techniques and approaches[EB/OL].http://www.infosys. tuwien.ac.at/Teaching/Courses/AK2/vor99/t13/.
  • 3Herve Daba, Marc Daciev, Andreas Wespsi. Towards a taxo-nomy of intrusion-detection systems[EB/OL]. Http://domino. Watson.ibm. Com/library/cyberdig. Nsf/0/db3e02d6c2322edd 852566340036757c? OpenDocument.
  • 4Ptacet Thomas H. Insertion, evasion, and denial of service: Eluding network intrusion detection[EB/OL]. http://secinf.net/info/ids/idspaper/idspaper.html.
  • 5Mark Crosbie, Eugene Spafford. Active defense of a computer system using autonomous agents[EB/OL]. http://www.cs. purdue.edu/homes/spaf/tech-reps/9508.ps.
  • 6Midori ASAKA, Shunji OKAZAWA. A method of tracing intruders by use of mobile agent[EB/OL].http://www.isoc.org/inet99/proceedings/4k/4k_2.htm.
  • 7Jai Sundar Balasubramaniyan,Jose Omar Garcia-Fernandez, David Isacoff.An Architecture for intrusion detection using autonomous agents[Z].Coast Lab Purdue Univ West Lafayette.
  • 8Richard Stevens W. TCP/IP 详解.卷1:协议(英文版)[M]. 北京:机械工业出版社, 2002.
  • 9杨向荣,宋擒豹,沈钧毅.入侵检测技术研究与系统设计[J].计算机工程与应用,2001,37(16):1-4. 被引量:22

二级参考文献10

  • 1[1]Richard Heady,George Luger, Arthur Maccabe et al.The architecture of a network level intrusion detection system[M].Technical Report CS90-20,Department of Computer Science,University of New Mexico, 1990.8
  • 2[2]J P Anderson. Computer Security Threat Monitoring and Surveillance [M].Technical report,James P Anderson Co.,Fort Washington,Pennsylvania, 1980.4
  • 3[3]Tener W T. Discovery:an expert system in the commercial data security environment[R].North-Holland:Proc Fourth JFIP TC1 1 International Conference on Computer Security, 1986
  • 4[4]Dorothy E Denning. An intrusion-detection model[J].IEEE Transactions on Software Engineering, 1987; 13(2):222-232
  • 5[5]Teresa L,Jagannathan R,Lee R et al. IDES:The enhanced prototype,a real-time intrusion detection system[R].Menlo Park,CA:SRI International,Computer Scence, 1988
  • 6[6]Crosbie M,Spafford G.Applying genetic programming to intrusion detection[R].Purdue University: Department of Computer Sciences,Coast L aboratory, 1997
  • 7[7]Smaha S E.Haystack: An intrusion detection system [A]. Proceeding of the IEEE Fourth Aerospace Computer Security Application Conference[C].Orlando, FL: IEEE, 1988
  • 8[8]Sebring M M,Shellhouse E,Hanna M E et al. Expertsystem in intrusion detection:a case study[R].Baltimore,MD: 1 1 th National Computer Security Conference, 1988
  • 9[9]Vaccaro H S,L iepins G E.Detection of anomalous computer session activity[R].Oakland,CA:Proceeding of the 1 989 Symposium on Research in Security and Privacy,1989
  • 10Tan K M C,Application Neural Networksto Unix Computer Security

共引文献51

同被引文献22

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部