吉林大学学报(工学版) ›› 2004, Vol. ›› Issue (4): 666-670.

Previous Articles     Next Articles

Hybrid distributed detection system module

LIU Pingping1, ZHOU Qiuzhan2, XU Hao1, SHEN Xuanjing1   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130022, China;
    2. College of Communication Engineering, Jilin University, Changchun 130022, China
  • Received:2004-02-28 Online:2004-10-01

Abstract: The research status on intrusion detection was studied and the analysis was conducted for the component based and agent based distribution intrusion modules in distribution intrusion detection systems. Combined these two modules, a hybrid distributed intrusion detection system(HIDS) on the basis of network based intrusion system(NIDS) and mainframe intrusion detection system(MIDS) was designed. Functions in the different parts of the system, working procedure, message format, and communication method were discussed. Then the system deployment scheme and experiment process were given. The experimental results show that the system can accurately detect various intrusion actions and quickly take countermeasures to block intrusive connections.

Key words: structure of computer system, distributed intrusion detection, component, agent, message format

CLC Number: 

  • TP393.08
[1] DARPA. CIDF-common intrusion detection framework[DB/OL].http:∥www.gidos.Org, 2001-07-10.
[2] BALASUBRAMANIYAN J S, GARCIA-FERNANDEZ J O, LSACOFF D.Architecture for intrusion detection using autonomous agents[R]. COAST Technical Report, COAST Laboratory, Purdue University, 1998.
[3] ROESCH Martin. Snort-Lightweight intrusion detection for networks[C]∥Proceedings of the 13th Large Installation System Administration Conference, Washington, USA, 1999.
[4] WENKE Lee, STOLFO S J, MOK K W. A data mining framework for building intrusion detection models[C]∥Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999.
[5] CHRISTOPHER K, THOMAS Toth. Distributed pattern detection for intrusion detection[C]∥Proceedings of the Network and Distributed System Security Symposium Conference, 2002.
[6] IDWG. The intrusion detection exchange protocol[DB/OL] http:∥www.Ietf.Org, Jan 2002.
[1] GU Hai-jun, TIAN Ya-qian, CUI Ying. Intelligent interactive agent for home service [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1578-1585.
[2] LIU Zhe, XU Tao, SONG Yu-qing, XU Chun-yan. Image fusion technology based on NSCT and robust principal component analysis model with similar information [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1614-1620.
[3] ZHANG Man, SHI Shu-ming. Analysis of state transition characteristics for typical vehicle driving cycles [J]. 吉林大学学报(工学版), 2018, 48(4): 1008-1015.
[4] GENG Qing-tian, YU Fan-hua, WANG Yu-ting, GAO Qi-kun. New algorithm for vehicle type detection based on feature fusion [J]. 吉林大学学报(工学版), 2018, 48(3): 929-935.
[5] WANG Jia-yi, LIU Xin-hui, WANG Xin, QI Hai-bo, SUN Xiao-yu, WANG Li. Mechanism and inhibition for displacement shifting impact on digital secondary component [J]. 吉林大学学报(工学版), 2017, 47(6): 1775-1781.
[6] CHEN He, YANG Zhi-jun, WU Zhao-chun, Feng Zhi-gang, ZHAO Ke-jia, LI Di-fei, TIAN Di. Standard generator and its calibration method for analog component video signal with distortion [J]. 吉林大学学报(工学版), 2017, 47(4): 1159-1164.
[7] WANG Yi-yuan, OUYANG Dan-tong, ZHANG Li-ming. Min-length hitting set GRASP algorithm based on dynamic degree of components [J]. 吉林大学学报(工学版), 2017, 47(3): 930-936.
[8] MENG Shu, SHEN Gui-xiang, ZHANG Ying-zhi, LONG Zhe, ZENG Wen-bin. Replacement time of system components of NC machine tools based on time-correlation [J]. 吉林大学学报(工学版), 2016, 46(6): 1946-1952.
[9] SU Chang, FU Li-ming, WEI Jun, LI Shuo, HUANG Lei, CAO Yue. Design method in exterior color based Kansei engineering and principal component analysis [J]. 吉林大学学报(工学版), 2016, 46(5): 1414-1419.
[10] MA Shuang, ZHOU Chang-jiu, ZHANG Lian-dong, HONG Wei, TIAN Yan-tao. Twist-lock online recognition based on improved incremental PCA by Kinect [J]. 吉林大学学报(工学版), 2016, 46(3): 890-896.
[11] YAO Yun-shi, YAN Qing-qing, WANG Rui-long, SU Pei, CHEN Shi-bin, FENG Zhong-xu. Spraying quality control of vehicle-mounted sprayer for liquid deicing and snow-melting agent [J]. 吉林大学学报(工学版), 2016, 46(1): 120-125.
[12] QI Xing-da, LI Xian-jun, LIU Si-yu, MENG Dong-hui. Differentiation research on industrial technology innovation ability by DEA and PCA [J]. 吉林大学学报(工学版), 2015, 45(3): 1017-1023.
[13] QIU Chun-ling, TAO Qiang, FAN Run-long, WANG Pei-zhi. Zircon image matching method based on description of SIFT feature by LBP [J]. 吉林大学学报(工学版), 2014, 44(6): 1793-1798.
[14] GU Bo-yu,SUN Jun-xi,LI Hong-zuo,LIU Hong-xi,LIU Guang-wen. Face recognition based on eigen weighted modular two-directional two-dimensional PCA [J]. 吉林大学学报(工学版), 2014, 44(3): 828-833.
[15] SONG Huai-bo, SHI Jian-qiang. Pose estimation of varied human faces based on PCA method [J]. 吉林大学学报(工学版), 2013, 43(增刊1): 43-46.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!