Design and Research of Adversarial Planning Model in Distributed Intrusion Detection System

被引:0
|
作者
Wang, Lei [1 ]
机构
[1] Chinese Peoples Armed Police Forces Acad, Dept Comp, Langfang, Hebei, Peoples R China
关键词
Distributed intrusion detection; Adversarial planning model; Adversarial plan;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the fast development of network technology, people are paying more and more attention to the safety of it. At present it is not enough that people only depend on traditional centralized intrusion detection method. This paper just points out such problems so as to improve the safety of network system. On the condition of multi-agent, according to the combination of the characteristic of adversarial planning theory and distributed intrusion detection technology, it can achieve that this model could be validly used in the distributed intrusion detection system by designing adversarial planning model and applying fuzzy set theory. Furthermore it can compare this model and classical autonomous agent for intrusion detection. Let intrusion detection and real-time response distribute and truly aim at achieving the recognition and reply when people do the vicious training in the environment of distributed intrusion detection.
引用
收藏
页码:128 / 131
页数:4
相关论文
共 12 条
  • [1] AN ARCHITECTURE FOR ADVERSARIAL PLANNING
    APPLEGATE, C
    ELSAESSER, C
    SANBORN, J
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1990, 20 (01): : 186 - 194
  • [2] CAO XD, 2003, FUZZY INFORM PROCESS
  • [3] EROL K, 1994, AIPS 94 JUN
  • [4] GU WX, ICMLC2005, V9
  • [5] LI JC, 2004, J HUAZHONG U SCI TEC, V32
  • [6] Ma Hengtai, 2000, MODEL PRACTICE DISTR, V1st
  • [7] WILLMOTT S, 1997, THESIS U EDINBURGH
  • [8] Willmott Steven, 1998, ECAI 98 JAN 20 UNPUB
  • [9] Willmott Steven, 1997, ECAI UNPUB
  • [10] Wu Kangheng, 2004, J SOFTWARE, V15