Research on the Application of Distributed Intrusion Detection System Based on Election Algorithm

被引:0
|
作者
Wang, Wuqi [1 ]
Yang, Zhi-min [2 ]
Peng, Gong [2 ]
机构
[1] Anhui Wonder Univ Informat Engn, Hefei, Anhui, Peoples R China
[2] Shangdong Vocat Coll Foreign Affairs Translat, Weihai, Shandong, Peoples R China
来源
关键词
Exponential scale method; The master control center; Election algorithm;
D O I
10.1007/978-3-319-15554-8_55
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed intrusion detection system, as a kind of important security defense technology, is widely used in all kinds of information network system. In this thesis, the detection overhead host node values are determined by application of exponential scale method, through the qualitative judgment and quantitative calculation. A distributed election algorithm is also proposed, master control center elected by the actual cost of the value of nodes, which greatly improve the overall defense capability of intrusion detection system. The main control center of the election can optimizer such key factors as reliabilities of current network bandwidth, link and detection subsystem performance at real-time, and make the system resources obtain the reasonable use, and greatly improve the overall defense capability of intrusion detection system.
引用
收藏
页码:670 / 676
页数:7
相关论文
共 50 条
  • [1] Research on distributed intrusion detection system
    Wang, Zeng-Quan
    Wang, Hui-Qiang
    Zhao, Qian
    Zhang, Rui-Jie
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 181 - +
  • [2] Distributed intrusion detection system based on optimized immune algorithm
    Qiao, PL
    Su, J
    Sun, CW
    [J]. ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 2, 2005, : 377 - 383
  • [3] Application Research on Data Mining Algorithm in Intrusion Detection System
    Wu, Weizu
    Liu, Liqun
    Xu, Bing
    [J]. 3RD INTERNATIONAL CONFERENCE ON APPLIED ENGINEERING, 2016, 51 : 607 - 612
  • [4] Research on Distributed Intrusion Detection System Based on Mobile Agent
    Hou, Zhisong.
    Yu, Zhou.
    Zheng, Wei.
    Zuo, Xiangang.
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (08) : 1919 - 1926
  • [5] Research on Distributed Intrusion Detection System Based on Protocol Analysis
    Qu, Xiaohong
    Liu, Zhijie
    Xie, Xiaoyao
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 421 - 424
  • [6] Research on distributed intrusion detection system based on mobile agent
    Cao, Jin-Gang
    Zheng, Gu-Ping
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1394 - 1399
  • [7] The research of system structure of distributed intrusion detection system
    Gu, HB
    Chen, F
    Huang, LL
    [J]. Wavelet Analysis and Active Media Technology Vols 1-3, 2005, : 1548 - 1553
  • [8] Research on the Improvement of Apriori Algorithm and Its Application in Intrusion Detection System
    Zheng, Jigang
    Yang, Lin
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 105 - 108
  • [9] Research of Distributed Intrusion Detection System Model Based on Mobile Agent
    Liu Jianxiao
    Li Lijuan
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 53 - 57
  • [10] Research on distributed network intrusion detection system for IoT based on honeyfarm
    Wu, Hao
    Hao, Jiajia
    Lu, Yunlong
    [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (01): : 106 - 118