Design and implementation, of self-protection agent for network-based intrusion detection system

被引:5
作者
Zhu, SR [1 ]
Li, WQ
机构
[1] Changsha Univ Elect Power, Changsha 410077, Peoples R China
[2] Beijing Univ Aeronaut & Astronaut, Beijing 100083, Peoples R China
来源
JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY | 2003年 / 10卷 / 01期
关键词
intrusion detection system ( IDS ); network-based intrusion detection system (NIDS); self-protection agent; IP filter;
D O I
10.1007/s11771-003-0073-z
中图分类号
TF [冶金工业];
学科分类号
0806 ;
摘要
Static secure techniques, such as firewall, hierarchy filtering, distributed. disposing, layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks existing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively.
引用
收藏
页码:69 / 73
页数:5
相关论文
共 10 条
[1]  
BRENDA MA, 2000, 12 ANN FIRST C C CHI, P177
[2]   Towards a taxonomy of intrusion-detection systems [J].
Debar, H ;
Dacier, M ;
Wespi, A .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :805-822
[3]  
EDWARD GA, 1999, INTRUSION DETECTION, P123
[4]  
HE YX, 2001, MINI MICRO SYSTEM, V22, P78
[5]  
HEADY R, 1997, COMMUN ACM, P88
[6]  
HUANG CL, 2001, COMPUTER APPL, P110
[7]  
JAI SB, 1998, COAST TECHNICAL REPO, P128
[8]   NETWORK INTRUSION DETECTION [J].
MUKHERJEE, B ;
HEBERLEIN, LT ;
LEVITT, KN .
IEEE NETWORK, 1994, 8 (03) :26-41
[9]  
STEPHEN N, 2000, NETWORK INTRUSION DE, P207
[10]  
WENKE L, 1998, 7 US SEC S, P88