Design and implementation of self-protection agent for network-based intrusion detection system

来源 :Journal of Central South University of Technology(English Ed | 被引量 : 0次 | 上传用户:shi2879999
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing, layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self protection agents were designed, which have the distributed architecture, cooperate with the agents in intrusion detection in a loose coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks existing in some system service process and back door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. Static secure techniques, such as firewall, hierarchy filtering, distributed disposing, layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self protection agents were designed, which have the distributed architecture, cooperate with the agents in intrusion detection in a loose coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and can not apperceive the existence of network based intrusion detection system. The communication between every part is secure. avoid the buffer leaks existing in some system service process and b ack door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively.
其他文献
Distribution behavior of terbutaline enantiomers was examined in the aqueous and organic solvent of a two phase system containing L dibenzoyltartaric acid and
明清小说宝物崇拜,有利于坚定善必将战胜恶、自强不息的信心,体现了一种正义必胜的理想期盼和价值趋向.也显示了明清尤其明代战争武器或生存器具改进的时代风潮,以及社会体制
There have been selected 83 samples of terracotta warriors and horses of Emperor Qin Shi Huangs Mausoleum, 20 samples of clays taken from around Qins Mausoleum
The morphology evolution of zinc continuous electrodeposits with nano-sized crystals on the ferrite substrate has been studied by in-situ scanning tunnel spectr
The microemulsion behavior in the quaternary system alkyl polyglucoside (C8G1.46 , C10G1.54)/1-butanol/cyclohexane/water has been studied at 40℃ with the alcoh
The structure, magnetization, and magnetocrystalline anisotropy were investigated using X-ray diffraction, vi-brating sample magnetometer, and AC susceptibility
苗木成本核算是苗圃经济核算工作的主要内容,如何准确合理地归集和分配生产经营活动所发生的费用,正确计量主客观因素对苗木成本带来的变化,是核算人员所面临的问题。文章对
The densification rate of C/C composites fabricated by directional flow thermal gradient chemical vapor infiltration process from C3H6, C3H6-N2 and C3 H6-H2 was
According to the switched complex mapping proposed by the author, the methodconstructing the switched processes generalized M(Mandelbrot) sets was elaborated, a
国家越来越重视农业问题,在农业方面的资金投入不断增加,农业科研事业单位的科研项目经费逐年增加。同时国家也在不断推进人事制度改革,改善人才评价体系,逐步实施绩效工资改