Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Design》 2010-01
Add to Favorite Get Latest Update

Research of IDS simulation model based on OPNET

TIAN Hai-fu,GUO Yi-xi,ZHANG Hong(Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,China)  
Aiming at the absence of IDS simulation model in OPNET,the basic function of IDS is analyzed firstly.Then,the three di-mension modeling framework of IDS simulation model is proposed,the principle of currency and easy implementation is followed,the IDS simulation model is modeled on the process,node and network domain.Finally,the validity of simulation model is proven by simulation result analyzing.Experiments show that the IDS simulation model extend the basic model of OPNET,and is very helpful to the network security simulation based on OPNET.
【Fund】: 军队预研基金项目(200704)
【CateGory Index】: TP391.9
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 SHI Huai-wei1,2, WANG Hua2, ZHANG Nian-jun1, ZHAO Lin-sheng1, SI Tong-guang3(1. Academic Affairs Office, Shandong Jianzhu University, Jinan 250101, China; 2. College of Computer Science andTechnology, Shandong University, Jinan 250100, China; 3. College of Management, Shandong Jianzhu University,Jinan 250101, China);Analysis of OPNET simulation technology and its application[J];Computer Engineering and Design;2006-17
2 PENG Zhi-hao,LI Guan-yu(School of Computer science and Technology,Dalian Maritime University,DaLian 116026 China);A Survey on Distributed Intrusion Detection System[J];Microelectronics & Computer;2006-09
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 XU Lei,FANG Hong-yu,LI Xiao-hui(College of Electronic Science and Technology,Anhui University,Hefei 230039,China);Simulation of Wireless Channel Access Protocol Based on OPNET[J];Journal of Anhui Institute of Education;2007-06
2 WANG Xiao-feng,SUN Ji-yin,LI Lin-lin,GAO Jing,CAO Zhi-qiang(No.402 Staff Room,The Second Artillery Engineering College,Xi'an 710025,China);Network Simulation and Application Technology Based on OPNET[J];Ordnance Industry Automation;2009-04
3 WANG Yuan1,CHEN Yuan-zhi1,YANG Shi-yong2 (1.Engineering Center of Digital Audio & Video,Communication University of China,Beijing 100024,China;2.Bejing BitWare Technology Co.Ltd,Beijing 100085,China);A New Type Energy-efficient Protocol for Wireless Sensor Networks[J];Journal of Communication University of China(Science and Technology);2008-02
4 FU Ying-fang~1,HE Jing-sha~2,LUAN liang-yu~3,WANG Rong~2,LI Guo-rui~1 (1.College of Computer Science and Technology,Beijing University of Technology,Beijing 100124,China; 2.School of Software Engineering,Beijing University of Technology,Beijing 100124,China; 3.College of Applied Science,Beijing University of Technology,Beijing 100124,China);A Distributed Key Management Scheme for Wireless Mesh Networks[J];Journal of Beijing University of Technology;2009-03
5 LIU Qiang,KUANG Jing-ming,WANG Hua,BI Zhi-ming(Department of Electronic Engineering,School of Information Science and Technology,Beijing Institute of Technology,Beijing 100081,China);TORA(Temporally Ordered Routing Algorithm)-Based Multi-Path Routing Algorithm for Mobile Ad Hoc Networks M-TORA[J];Transactions of Beijing Institute of Technology;2006-05
6 ZHANG Yu,FENG Chun-yan,GUO Cai-li,ZENG Zhi-min(Institute of Telecommunication Network Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);Research of Spectrum Sensing in Cognitive Radio Network[J];Journal of Jilin University(Information Science Edition);2008-02
7 QU Ren-hui1a,DI Chao-sheng1b,DI Xin2(1a.College of Communication Engineering;1b.Corporation of Communication Engineering,Jilin University,Changchun 130012,China;2.Jilin Mobile Network Admin Center,Changchun 130033,China);Research on Distributed Adaptive Cache Update Algorithm in Mobile Ad Hoc Network[J];Journal of Jilin University(Information Science Edition);2008-03
8 LIU Feng-hai,ZHENG Yu-zheng (Chengdu University of Information Technology,Chengdu 610225,China);Resolution and simulation of AODV protocol of Ad Hoc[J];Journal of Chengdu University of Information Technology;2007-05
9 ZENG Jiao,FANG Yong,ZHENG Wei-zhong(Institute of Information Security,SCU,Chengdu 610064,China);Design and implementation of a P2P media streaming simulation system based on scalable coded media[J];Journal of Chengdu University of Information Technology;2008-06
10 FU Li,LI Ge,AI Peng(School of Software Engineering,Chongqing University,Chongqing 400044,China);Simulation of DDOS Attacks in LANS Based on OPNET[J];Journal of Chongqing Institute of Technology(Natural Science Edition);2007-10
China Proceedings of conference Full-text Database 10 Hits
1 ;The Design of Network Intrusion Detection System in Linux based on Artiifcial Intelligence[A];[C];2009
2 Liu Xin, Yang Jia-Wei (State Key Laboratory on Integrated Service Network, XiDian University, Xi'an710071, China);Simulation of Improved Flooding Route Based on OPNET[A];[C];2006
3 Song Yulin, Fan Xiangning, Zhang Zaichen (National Mobile Communications Research Laboratory, Southeast University, Nanjing, Jiangsu, 210096);Research on Energy Routing Protocol in Wireless Sensor Networks[A];[C];2006
4 Qin Ziyan Zhao Zengyi (School of Communications and Control Engineering,jiangnan University,wuxi,jiangsu 214122,china);Analysis of False Information in Net Intrusion Detection System[A];[C];2008
5 Shen Hong-ting Department of Computer Science,Guizhou University,Guiyang,Guizhou 550025,China;Research of Genetic Algorithm Applied to Network Intrusion Detection System[A];[C];2008
6 PENG Hong RUAN Ying-ping LIU Qi College of Information Engineering,Zhejiang University of Technology,Hangzhou 310014;Performance study and improvement of DSR routing based on OPNET[A];[C];2008
7 Mao Jianbing, Mao Yuming SCIE, University of Electronic Sci.&Tech of China, Chengdu 610054;An Assistant Platform for Ad Hoc Network Protocol Design[A];[C];2006
8 Zhuhai, Zhulei Postgraduate Team 3 ICE, PLAUST, Nanjing China; 210007 Department of telecom engineering ICE, PLAUST,Nanjing China; 210007;Application of Control Theory to Modeling and Analysis of TCP Congest Control[A];[C];2006
9 CHEN Da-wei WANG Qian TONG Feng XU Xiao-mei (Key Laboratory of Underwater Acoustic Communication and Marine Information Technology of the MOE,Xiamen University,Xiamen 361005,China);Performance simulation of ALOHA protocol in underwater acoustic monitoring network for marine environment[A];[C];2007
10 Ma Song1, Tu Xiaodong2, Liu Jian3 Key Laboratory of Broadband Optical Fiber Transmission and Communication Networks, University of Electronic Science and Techology of China, Chengdu, Sichuan, 610054;Modeling and simulation of the cell resequencing problem in the multistage switch networks[A];[C];2006
【Secondary Citations】
Chinese Journal Full-text Database 6 Hits
1 HONG Jia-ping, KE Zhong-wu, TONG yu, CHEN Nian-sheng, DONG Wu-shi (Department of Computer Science, Hubei Normal University, Huangshi 435002,China);Application of OPNET in the network project and design[J];Journal of Hubei Normal University(Natural Science);2004-04
2 Yang Hongyu1,2 Xie Lixia3 Wang Xinglong31(Software Technology Research Center,Civil Aviation University of China,Tianjin 300300)2(Department of Computer Science and Engineering,Tianjin University,Tianjin 300072)3(School of Computer Science and Technology,Civil Aviation University of China,Tianjin 300300);Application and Practice of Network Simulation Software[J];Computer Engineering and Applications;2005-10
3 YANG Luming,LI Xiehua(College of Information Science and Engineering,Central South University,Changsha 410083);Comparison & Analysis of Network Simulators and Discussion on Process of Network Simulation[J];Computing Technology and Automation;2002-04
4 WANG Ke-yi, Fang Hui, CAI Xu-bin (Department of Computer Science and Technology,Beijing University,Beijing 100871);The design and realization of emulation environment and flow analysis for ATM networks[J];Computer Engineering and Design;2001-01
5 LU Yong-lin, WEI Li-feng, QI Hong-yan(Shenyang Institute of Chemical Technology, Shenyang 110142, China);A Practical Approach of Network Performance Analysis and Evaluation[J];Journal of Shenyang Institute of Chemical Technology;2004-02
6 QING Si-han, JIANG Jian-chun, MA Heng-tai, WEN Wei-ping, LIU Xue-fei (1. Institute of Software of Chinese Academy of Sciences, Beijing 100080, China; 2. Engineering Research Center for Information Security Technology, Chinese Academy of Sciences, Beijing 100080, China; 3. Graduate School of Chinese Academy of Sciences, Beijing 100080, China);Research on intrusion detection techniques: a survey[J];Journal of China Institute of Communications;2004-07
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved