期刊文献+

基于证据推理的多agent分布式入侵检测系统模型 被引量:2

Multi-agent distributed intrusion detection system model based on evidence reasoning
在线阅读 下载PDF
导出
摘要 在分析现有基于agent的入侵检测系统(IDS)基础上,提出了一种基于证据推理的多agent分布式两级IDS模型。该模型采用分布检测、分布响应的模式,通过多agent技术的思想建立系统总体结构,给出了模型的各个组成部分,并对结构中各种agent与中心控制台的功能设计进行了分析。同时,为了提高中心控制台的融合性能,设计了一种可有效减少证据合成计算量又可确保合成准确性的证据推理算法,并对动态选举算法、协同算法进行了初步分析。系统可充分利用各种资源协同完成入侵检测任务,实时响应,有效地改进了传统IDS。 This paper proposed a distributed IDS (DIDS) model utilizing both multi-agent and evidence reasoning by analyzing the existed agent-based IDS, which adopted the method of distributed detection, distributed response and the ideology of multi-agent. And it described all the composed parts of DIDS model and analyzed the function design of all kinds of agent and the control centre. To improve the performance of the control centre, presented an algorithm for evidence reasoning to decrease the computation and increase the accuracy of combination. Furthermore, discussed the algorithms of dynamic election and cooperation preliminarily. The proposed DIDS may make full of all kinds of information to cooperatively complete the detection and make real-time response, which effectively improves the traditional IDS.
出处 《计算机应用研究》 CSCD 北大核心 2009年第8期3063-3066,共4页 Application Research of Computers
关键词 证据推理 分布式入侵检测系统 多代理 协同 evidence reasoning DIDS multi-agent cooperation
  • 相关文献

参考文献3

二级参考文献25

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8徐耀红.数据融合理论与应用[M].西安电子科技大学出版社,1998..
  • 9Balasubramaniyan J S, Farcia-Femandez J O, Isacoff D, et al. An Architecture for Intrusion Detection Using Autonomous Agents:[Technical report]. 98/05. Purdue University, 1998
  • 10Shajari M, Ghorbani A A. Application of Belief-Desire-Intention agents in intrusion detection and response. In:Proceedings of Privac, Securit, Trust (ST04)Conference, Fredericto, New Brunswick,October, 2004, 181-191

共引文献131

同被引文献8

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部