Font Size: a A A

Research And Implement Of Mobile Agent In Intrusion Detected System

Posted on:2005-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:S C XiaoFull Text:PDF
GTID:2168360125964952Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
When Internet opens to more and more fields, finance, government and army require higher quality network security. Therefore, the network security researchers brought forward many new technologies, such as firewall,data encrypt,data authentication,VPN,IDSs,access control, etc. Among them, firewall is most widely used. By using access control mechanism, it prevents non-authorization from accessing. But firewall cannot prevent the misuse of legal user and internal attacking. IDS was introduced to perfect computer security system in eighties. IDS can protect important data, resource and network. To some extent, this is an active network security technology. It can detect and record intruder's trace. So IDS frightens the intruders.By far, the accuracy of alarm for intruders is not high because of the large data processing. It becomes the main problem that how to improve the data processing ability of the whole system. Mobile agent is the production of the development of distributed, network and AI. MA derived from the distruted calculating technology. Its application in ID field improves the data fusion ability greatly. And its autonomy and mobility also improve the performance and response of ID.This thesis mainly researched the advantages and brought forward a model of Mobile Agent in Intrusion Detected System (MAIDS). Through analyse and research, we found the advantages of MA technology in ID. Finally, it was realized on mobile agent establishment. By experiments, the validity, autonomy and mobility of this model were proved. It is concluded that the model mentioned in this thesis made up for the disadvantages of autonomy and intrusion response of the traditional IDS.
Keywords/Search Tags:Mobile Agent, CIDF, IDS, Distributed Computing, Autonomy
PDF Full Text Request
Related items