Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《China Mechanical Engineering》 2006-01
Add to Favorite Get Latest Update

Study on Distributed Multi-agent IDS in Networked Manufacturing

Yin Yong Zhou Zude Li Fangmin Liu Quan Wuhan University of Technology, Wuhan, 430070  
A multi-agent distributed IDS model, enhanced with a method of computing statistical values, was presented. This model can accomplish distributed information collections, and distributed intrusive detections and real-time reactions. The IDS based on this model, which has advantages of real-time reactions and openings, can detect intrusions being behalf of both knowns and unknowns. Also the software frame of the IDS was introduced.
【Fund】: 国家自然科学基金资助重点项目(50335020);; 高等学校博士学科点专项科研基金资助项目(20020497006)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 YIN Yong, CHEN You-ping, ZHOU Zu-de, YUAN Chu-ming(Huazhong Univ. of Sci & Tech.,Wuhan 430074,China);The study and implementation of a secure VPN based on Ipsec in networkmanufacturing system[J];Manofacturing Automation;2002-10
2 SHENG Si-yuan, ZHAN Shou-yi, SHI Yao-bin (Department of Computer Science, Beijing Institute of Technology, Beijing 100081, China);On the Study and Trend of Network Security Technologies[J];Acta Simulata Systematica Sinica;2001-S2
Chinese Journal Full-text Database 9 Hits
1 TAN Xiao, YUAN Chang - an, LONG Long (Guangxi Normal College,Nanning,Nanning,Guangxi 530001,China);Intrusion Detection Technology Based on Data Mining[J];Computer Security;2009-11
2 CAO Cheng1,ZHOU Jian2,ZHOU Hong3,WANG Ming-fu1(1.School of Computer and Information,Hefei University of Technology,Hefei 230009,China;2.Network Center,Hefei University of Technology,Hefei 230009,China;3.Computer Department,Artillery College of PLA,Hefei 230031,China);Analysis of network security and effective measures[J];Journal of Hefei University of Technology(Natural Science);2007-09
3 Zhang Xiujuan Wei Shuguang Xia Jianchuan Postgraduate; College of Computer Sci. & Tech., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China.;A model of compress secure transfer[J];Journal of Huazhong University of Science and Technology;2004-09
4 Gu Xuemin Sun Shudong(College of Electromechanical Engineering,Northwestern Polytechnical University,Xi'an710072);An Internet-Based Manufacturing Resources Information Gathering System[J];Computer Engineering and Applications;2003-32
5 Wang Xinming 1 Zheng Chunling 2 Xu Shouzhi 11 (Department of Communication Science&Technology,Huazhong University of Science and Technology,Wuhan430074) 2 (Department of Mathematics,Jingdezhen College,Jingdezhen,Jiangxi333000);Network Security Evaluation System Based on Relational Database[J];Computer Engineering and Applications;2004-02
6 MENG Xuejun1, SHI Gang2 (1. Network Center, Wuhan University, Wuhan 430072; 2. College of Computer, Wuhan University, Wuhan 430072);Network Security Architecture Based on P~2DR Model[J];Computer Engineering;2004-04
7 XU Li-yun,LI Ai-ping(Inst.of Advanced Manufacturing Tech.,Tongji Univ.,Shanghai 200092,China);Security technology of networked manufacturing based on ASP mode[J];Computer Integrated Manufacturing Systems;2006-11
8 Guo Jiuyu Deng Xianer (Huaihua Medical College);Netwrok Security Problems in Libraries and the Countermeasures[J];Library;2005-01
9 Wang Xinjun (Shandong University of Technology Library, Zibo 255049, China);Security Management of Library Intranet in Combined Universities[J];New Technology of Library and Information Service;2004-07
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 Jinag weijin, Xu yuhui (Zhuzhou institute technology,Zhuzhou 412008);Research of the Architecture of Network And Information Security[J];COMPUTER ENGINEERING AND APPLICATIONS;2000-09
2 Zeng Zhifeng Yang Yixian (Department of Information Engineering,Beijing University of Posts and Telecommunications, Beijing 100876);On the Trend and Study of Network Security[J];COMPUTER ENGINEERING AND APPLICATIONS;2000-10
3 XIE Zhijiang1, XIE Dongqing2, ZHOU Zhouyi2 (1.Changsha Electronic Power College, Changsha 410077; 2. Department of Computer Science, Hu nan University, Changsha 410082);VPN Security Structure Based on IP Data Packet Encryption[J];Computer Engineering;2001-03
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved