Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of University of Electronic Science and Technology of China》 2009-02
Add to Favorite Get Latest Update

IDMEF-Based Architecture of Large-Scale Cooperative IDS System

ZHANG Min and LUO Guang-chun (Information Center, University of Electronic Science and Technology of China Chengdu 610054)  
Intrusion detection message exchange format (IDMEF) standard has been widely used in intrusion detection system (IDS). This paper proposes an architecture of large scale cooperative IDS based on IDMEF. The design and implementation of the cooperative IDS are discussed by the means of Prelude framework and development suite. The deployment and application of this architecture on CERNET are finally analyzed.
【Fund】: 四川省应用基础研究基金(2006J13-070)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 4 Hits
1 Yang Xiangrong Song Qinbao Shen Junyi (Department of Computer Science and Technology,Xi'an Jiaotong University,Xi'an 710049);Research on the Intrusion Detection Technology and A System's Design[J];Computer Engineering and Applications;2001-16
2 Ruan Yaoping; Yi Jiangbo; Zhao Zhangsheng(State Key Lab of Information Security, Graduate School of USTC, Beijing 100039);The Model and Methodology of Intrusion Detection in Computer System[J];COMPUTER ENGINEERING;1999-09
3 GUO Fan,YU Min,YE Ji-hua(School of Computer and Information Engineering,Jiangxi Normal University,Nanchang Jiangxi 330022,China);A distributed intrusion detection system model based on correlation and agent[J];Journal of Computer Applications;2007-05
4 PEI Jin-ze~(1,2),XIAO Feng-tao~1,HU Huaping~1,HUANG Chen-lin~1(1.School of Computer Science,National University of Defense Technology,Changsha Hunan 410073,China;2.The 92493 Unit of PLA,Huludao Liaoning 125000,China);Design and Implementation of Unifying Alert Information Format Scheme[J];Application Research of Computers;2006-02
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Wang ZhiXin (China Youth College for Political Sciences Beijing 100089);The Comparison of Several Common Web Browsers[J];Office Automation;2007-20
2 Wen Xiaodong Huang Ronghuai Shen Changning Wang Lang Yao Jiqing (Information Science College, Beijing Normal University, 100875, Beijing, China);DEVELOPMENT OF A SNORT-BASED SECURITY NETWORK MANAGEMENT AND REAL-TIME INTRUSION DETECTION SYSTEM[J];Journal of Beijing Normal University(Natural Science);2004-01
3 QIU Zhou-qiang,TENG Shao-hua,LI Zhen-kun,CHEN Ping-hua, ZHANG Wei (Faculty of Computer,Guangdong University of Technology,Guangzhou 510090,China);The Application of the Data Mining Technology in Network Intrusion Detection[J];Journal of Jiangxi Normal University(Natural Sciences Edition);2006-01
4 LI Ke-ling(Computer Science and Technology Institute,Changchun University,Changchun 130022,China);Study on intrusion detection technology[J];Journal of Changchun University;2007-06
5 TANG Yang,XU Qian(1.College of Computer Science of Chongqing University,Chongqing 400044,China;2.Chongqing Electric Power College,Chongqing 400053,China);The Recognition and Defenses of Network Intrusion Detection via Exceptional Operations[J];Journal of Chongqing Electric Power College;2008-01
6 CHEN Bo, MA Wu(Information Engineering Institute, Dalian University, Dalian 116622, China);A Summary of Distributed Intrusion Detection Techniques Based On Agent[J];Journal of Dalian University;2008-06
7 Chen Ling (College of Mechanical Electromechanical Eng. UEST of China Chengdu 610054);Design of the Distributed Instrusion Detection System[J];Journal of University of Electronic Science and Technology of China;2002-02
8 ZHANG Jun,ZHONG Le- hai (College of Computer Science, China West Normal University,Nanchong 637002,China);Research of Network Intrusion Detection System Based on IPv6 Environment[J];Computer Knowledge and Technology;2008-18
9 SONG Yu-pu, YU Jin-na (Dept of Computer, Shangqiu College of Professional Technology, Shangqiu 476000, China);Data Encryption Mechanism for Research and Implementation[J];Computer Knowledge and Technology;2009-09
10 ZHANG Zhenyu,YIN Xiaochuan,JIANG Wenting(Air Force Engineering University,Xi'an 710077,China);Security Events Data Exchange and Transfer Based on Prelude[J];Electronic Engineer;2006-11
【Secondary Citations】
Chinese Journal Full-text Database 7 Hits
1 TANG Hong-ying,FU Guo-yu (Department of Computer Science, Chongqing Institute of Technology, Chongqing 400050,China);Principle and Method of Invading Detection[J];Journal of Chongqing Institute of Technology Management;2002-02
2 ZHANG Yi rong, XIAN Ming, ZHAO Zhi chao, XIAO Shun ping, WANG Guo yu (College of Electronic Science and Engineering, National Univ. of Defense Technology, Changsha 410073, China);A Study on the Evaluation Technology of the Attack Effect of Computer Networks[J];Journal of National University of Defense Technology;2002-05
3 Mu Chengpo, Huang Houkuan, and Tian Shengfeng (School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044);A Survey of Intrusion-Detection Alert Aggregation and Correlation Techniques[J];Journal of Computer Research and Development;2006-01
4 Yang Xiangrong Song Qinbao Shen Junyi (Department of Computer Science and Technology,Xi'an Jiaotong University,Xi'an 710049);Research on the Intrusion Detection Technology and A System's Design[J];Computer Engineering and Applications;2001-16
5 Ruan Yaoping; Yi Jiangbo; Zhao Zhangsheng(State Key Lab of Information Security, Graduate School of USTC, Beijing 100039);The Model and Methodology of Intrusion Detection in Computer System[J];COMPUTER ENGINEERING;1999-09
6 LU Yuliang, XIA Yang (Teaching and Research Office of Network Engineering , Electronic Engineering Institute of PLA, Hefei 230037);Application of Analytic Hierarchy Process to Target Computer Secure Quantitative Fusion[J];Computer Engineering;2003-22
7 WANG Yijun, XUE Zhi, LI Jianhua (Dept. of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030);Remote OS Detection Based on TCP/IP Stack Fingerprinting[J];Computer Engineering;2004-18
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved