计算机技术、自动化技术 |
|
|
|
|
基于多代理的混合式入侵检测系统模型 |
张宝军1,潘雪增1,王界兵2,平玲娣1 |
(1.浙江大学 计算机科学与技术学院,浙江 杭州 310027;2. 汉帆(杭州)信息技术有限公司,浙江 杭州 310012) |
|
Multi-agent based hybrid Intrusion detection system |
ZHANG Bao-jun1, PAN Xue-zeng1, WANG Jie-bing2,PING Ling-di1 |
(1.College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China;
2.Hifn (Hangzhou) Information Technology Limited Company, Hangzhou 310012, China) |
引用本文:
张宝军, 潘雪增, 王界兵, 等. 基于多代理的混合式入侵检测系统模型[J]. J4, 2009, 43(6): 987-993.
ZHANG Bao-Jun, BO Xue-Ceng, WANG Jie-Bing, et al. Multi-agent based hybrid Intrusion detection system. J4, 2009, 43(6): 987-993.
链接本文:
http://www.zjujournals.com/xueshu/eng/CN/10.3785/j.issn.1008-973X.2009.
或
http://www.zjujournals.com/xueshu/eng/CN/Y2009/V43/I6/987
|
[1] HEADY R, LUGER G, MACCABE A, et al. The architecture of a network level intrusion detection system [R]. New Mexico: Department of Computer Science, University of New Mexico, 1990.
[2] ANDERSON J P. Computer security threat monitoring and surveillance [R]. Fort Washington, Pennsylvania: James P Anderson Co., 1980.
[3] DENNING D E. An intrusion-detection model [J]. IEEE Transaction on Software Engineering, 1987, 13(2): 222232.
[4] LUNT T F, JAGANNATHAN R, LEE R, et al. Development and application of IDES: a real-time intrusion detection expert system [R]. California, USA: SRI International, 1988.
[5] HEBERLEIN L T, DIAS G V, LEVITT K N, et al. A network security monitor [C]∥ Proceedings of the IEEE Symposium on Research in Security and Privacy. Los Alamitos, California: IEEE Computer Society, 1990: 296305.
[6] SNAPP S R, BRENTANO J, DIAS G V, et al. DIDS (distributed intrusion detection system) - motivation, architecture, and an early prototype [C]∥ Proceedings of the 14th National Computer Security Conference. Baltimore, USA: NIST, 1991: 167176.
[7] SNAPP S R, SMAHA S E, GRANCE T, et al. The DIDS (distributed intrusion detection system) prototype [C]∥ Proceedings of the USENIX Summer 1992 Technical Conference. San Antonio, Texas: Usenix Association, 1992: 227233.
[8] CROSBIEM, SPAFFORD E. Defending a computer system using autonomous agonts\ [R\]. Indiana: COAST Laboratorg, Purdue University, West Lafayette,1994.
[9] BALASUBRAMANIYAN J S, GARCIA-FERNANDEZ J O, LSACOFF D, et al. An architecture for intrusion detection using autonomous agents [R]. West Lafayette: Purdue University, COAST Laboratory, 1998.
[10] SPAFFORD E H, ZAMBONI D. Intrusion Detection Using Autonomous Agents [J]. Computer Networks, 2000, 34(4): 547570.
[11] CHEUNG S, CRAWFORD R, DILGER M, et al. The design of GrIDS: a graph-based intrusion detection system [R]. Davis, CA: University of California at Davis, Department of Computer Science, 1999.
[12] CANNADY J. Artificial neural networks for misuse detection [R]. Fort Lauderdale: Nova Southeastern University, 1998: 113.
[13] CHAVAN S, SHAH K, DAVE N, et al. Adaptive neuro-fuzzy intrusion detection system [C]∥ IEEE International Conference on Information Technology: Coding and Computing (ITCC’04). Las Vegas, Nevada, USA: IEEE Computer Society, 2004, 1: 7073.
[14] ESPONDA F, FORREST S, HELMAN P. A formal framework for positive and negative detection [J]. IEEE Transactions on Systems, Man, and Cybernetics—Part B: Cybernetics, 2004, 34(1): 357374.
[15] MUKKAMALA S, SUNG A H, ABRAHAM A. Intrusion detection using ensemble of soft computing paradigms [C]∥ Third International Conference on Intelligent Systems Design and Applications, Intelligent Systems Design and Applications, Advances in Soft Computing. Germany: Springer Verlag, 2003: 239248. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|