Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Zhejiang University(Engineering Science)》 2006-03
Add to Favorite Get Latest Update

Grid computing oriented on-demand intrusion detection model

CHEN Rong,GAO Ji,GUO Hang(College of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China)  
To solve the problem of lacking dynamic organizing agility in distributed intrusion detection systems,an on-demand intrusion detection model adaptive to the shared data environment was presented.Considering the dynamic sharing and multi-domain integration properties of grid computing,the intrusion detection system consisted of four parts including security estimate system,work flow programming service,data grid environment and detection resource service in the model based on global detection services.By combining the system and node level reconstructions,detection services were ensured from nodes when global detection services of intrusion detection system failed.Results show that compared with the intrusion detection system Snort,the analysis engine program Higen can consume less detection time and user time in local area network(LAN) and wide area network(WAN) experimental environment,and improve the agility of cooperative detection in grid computing.
【Fund】: 国家“973”重点基础研究发展计划资助项目(2003CB1700);; 国家“863”高技术研究发展计划资助项目(2002AA104520)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 YANG Ming-hui WANG Run-chuan(College of Computer,Nanjing University of Posts & Telecommunications,Nanjing 210003,China);Negative Operator Embedded Clonal Selection Algorithm for Grid Intrusion Detection[J];Computer Science;2009-12
2 DUAN Li-yan1 , LIU Bo2 , YU Xiao-hua2 (1. Network Center, South China Normal University,Guangzhou 510631; 2. College of Computer, South China Normal University,Guangzhou 510631);Study on Grid-Oriented Distributed Intrusion Detection System[J];Modern Computer;2007-08
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 YAN Huai-cheng,HUANG Xin-han,WANG Min(Control Science and Engineering,Huazhong University of Science and Technology,Wuhan 430074,China);Multi-sensor data fusion technique and its application[J];Journal of Transducer Technology;2005-10
2 YAN Bo,LI Guang-jun (School of Communication and Information Engineering, UEST of China Chengdu 610054);An Attack Defense System Based on State Detection Firewall of Linux[J];Journal of University of Electronic Science and Technology of China;2005-04
3 QIAN Wei-zhong1,WANG Wei-ran1,YUAN Hong-chun2 (1. School of Electronic Engineering, UEST of China Chengdu 610054; 2. School of Computer Science and Engineering,UEST of China Chengdu 610054);Boundary Defense System Based on DFW[J];Journal of University of Electronic Science and Technology of China;2005-04
4 WANG Shang-ping 1,2,WANG Yu-min2,WANG Xiao-feng1,ZHANG Ya-ling1,QIN Bo1 (1 Natural Science Institute,Xi'an University of Technology,Xi'an,Shaanxi 710048,China; 2 China National Key Lab.on ISN, Xidian University,Xi'an,Shaanxi 710071,China);A Zero-Knowledge Proof Scheme of Possessing a DSA Digital Signature[J];Acta Electronica Sinica;2004-05
5 HUANG Xin-yi,ZHANG Fu-tai,WU Wei(School of Mathematics and Computer Science,Nanjing Normal University,Nanjing,Jiangsu 210097,China);An Identity-Based Ring Signcryption Scheme[J];Acta Electronica Sinica;2006-02
6 XIAO Ben xian, ANG Wei bing, WANG Qun jing (School of Electrical Engineering, Hefei University of Technology, Hefei 230009, China);On fast neural network training algorithm with hybrid genetic algorithm[J];Journal of Hefei University of Technology(Natural Science);2001-05
7 WU Jian Xin, ZHOU Zhi Hua, SHEN Xue Hua, and CHEN Zhao Qian(State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093);A SELECTIVE CONSTRUCTING APPROACH TO NEURAL NETWORK ENSEMBLE[J];JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT;2000-09
8 LI Hui, GUAN Xiao-Hong, ZAN Xin, and HAN Chong-Zhao (Center for Networked Systems and Information Security, State Key Laboratory of Manufacturing Systems, at Xi'an Jiaotong University, Xi'an 710049);Network Intrusion Detection Based on Support Vector Machine[J];Journal of Computer Research and Development;2003-06
9 Shen Qingni, Qing Sihan, and Li Liping (Engineering and Research Center for Information Security Technology, Chinese Academy of Sciences, Beijing 100080) (Institute of Software, Chinese Academy of Sciences, Beijing 100080) (Graduate University, Chinese Academy of Sciences, Beijing 100049);Design and Implementation of a Multi-Layered Privilege Control Mechanism[J];Journal of Computer Research and Development;2006-03
10 Guan Jian Liu Daxin(College of Computer Science and Technology,Harbin Engineering University,Harbin150001);GCIDS :Genetic Classifier-Based Intrusion Detection and Response System[J];Computer Engineering and Applications;2003-15
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved