[1]何向荣 沈佐民 吴璞 王汝传.移动代理入侵检测系统中的自适应技术的研究[J].计算机技术与发展,2006,(02):229-231.
 HE Xiang-rong,SHEN Zuo-min,WU Pu,et al.Research on Adaptive Technique of Intrusion Detection and System Based on Mobile Agent[J].,2006,(02):229-231.
点击复制

移动代理入侵检测系统中的自适应技术的研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年02期
页码:
229-231
栏目:
计算机安全
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Adaptive Technique of Intrusion Detection and System Based on Mobile Agent
文章编号:
1005-3751(2006)02-0229-03
作者:
何向荣1 沈佐民1 吴璞1 王汝传12
[1]池州师范专科学校[2]南京邮电大学计算机科学与技术系
Author(s):
HE Xiang-rong SHEN Zuo-min WU PuWANG Ru-chuan
[1]Chizhou Teachers College[2]Dept. of Computer Sci. and Techn. ,Nanjing Univ. of Posts and Telecomm
关键词:
入侵检测入侵响应移动代理自适应
Keywords:
intrusion detection intrusion response mobile agent adaptive
分类号:
TP393.08
文献标志码:
A
摘要:
YP绍了入侵检测及入侵响应系统中的自适应技术。提出了基于代理的自适应分层入侵检测系统(AAHIDS,Agent—based Adaptive Hierarchical Intrusion Detection System)和基于代理的自适应入侵响应系统(AJRS,Agent—based Adaptive Intrusion Response System)。它们通过调整负责检测入侵行为的系统资源来实现自适应性,动态调用新的底层检测代理的组合以及调整与这些底层代理相关的置信度来适应变化的环境。通过增加过去已获得成功的响应机制的权值,使成功的响应机制获得更多的调用机会来实现响应的自适应性
Abstract:
It introduces adaptation in intrusion detection and intrusion response. An agent- based adaptive hierarchical intrusion detection system (AAHIDS) and agent- based adaptive intrusion response system (AAIRS) are brought forth. They adjust the system resource used to detect intrusion action to realize adaptation, adapt to the variant circumstance by invoking new combination of low level detection agent dynamic and adjusting the confidence metric of these low level agent. Finally they increase the weight of the successful response, which make the response get more chance to be called to realize the adaptation of the response system

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(02):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(02):151.
[3]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(02):148.
[4]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(02):254.
[5]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(02):162.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(02):170.
[7]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(02):168.
[8]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(02):179.
[9]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
 WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(02):177.
[10]薛俊 陈行 陶军.一种基于神经网络的入侵检测技术[J].计算机技术与发展,2009,(08):148.
 XUE Jun,CHEN Hang,TAO Jun.Technology of Intrusion Detection Based on Neural Network[J].,2009,(02):148.

备注/Memo

备注/Memo:
国家自然科学基金(60173037,70271050);江苏省自然科学基金(BK2005146);江苏省自然科学基金预研项目(BK2004218):江苏省高技术研究计划(BG2004004、BC-2005037);国家“八六三”高科技项目(2005AA775050);江苏省计算机信息处理技术重点实验室基金(kjs050001)何向荣(1958-),男,安徽池州人,讲师,研究方向为计算机软件和应用
更新日期/Last Update: 1900-01-01