The Research and Design of the Intelligent Security Defendable Software's Cooperative Framework

被引:0
|
作者
Wang, Jin-Dong [1 ]
Cao, Wei-Wei [1 ]
Wang, Kun [1 ]
Zhang, Heng-Wei [1 ]
机构
[1] PLA Univ Informat Engn, Inst Elect Technol, Zhengzhou, Peoples R China
关键词
Intelligent Security Defendable Software; Component technology; Cooperative framework; Network security;
D O I
10.1109/ISBIM.2008.152
中图分类号
F [经济];
学科分类号
02 ;
摘要
Coordinated defense is one of network security technology development directions, and how to make security systems work cooperatively is a critical problem. So uniform coordinated working mechanisms and policies are necessary. In Intelligent Security Defendable Software (ISDS), Execution Components can work cooperatively and implement coordinated tasks, and they need uniform commands. Hence coordinated-control has become very critical to ISDS. In order to make components in ISDS work cooperatively, combining with the characteristics of ISDS, a cooperative framework is presented in this paper, and the design of the Command Component (CC) is discussed in particular. The framework combines component technology, cooperative working and artificial intelligent, which has security, cooperatively and extensibility.
引用
收藏
页码:273 / 276
页数:4
相关论文
共 50 条
  • [1] Demo: The Design and Implementation of Intelligent Software Defined Security Framework
    Zhang, Shasha
    Song, Shuyu
    Yang, Fan
    Li, Rongpeng
    Zhao, Zhifeng
    Zhang, Honggang
    [J]. MOBICOM'19: PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2019,
  • [2] S2Net: A Security Framework for Software Defined Intelligent Building Networks
    Xue, Nian
    Huang, Xin
    Zhang, Jie
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 654 - 661
  • [3] Design and Research on Intelligent Library Guidance Software
    Liu, Chunxiao
    [J]. INTERNATIONAL JOURNAL OF MULTIPHYSICS, 2024, 18 (03) : 557 - 569
  • [4] Advanced Research on Software Security Design and Applications
    Aljawarneh, Shadi A.
    Cena, Federica
    Maatuk, Abdelsalam
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2016, 22 (04) : 453 - 458
  • [5] The Design of Intelligent Security Defensive Software based on Autonomic Computing
    Shen, Liuqing
    Wang, Jindong
    Wang, Kun
    Zhang, Hengwei
    [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL I, PROCEEDINGS, 2009, : 489 - 491
  • [6] Model driven security framework for software design and verification
    Deveci, Engin
    Caglayan, Mehmet U.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2768 - 2792
  • [7] A SOFTWARE FRAMEWORK FOR INTELLIGENT COMPUTER-AUTOMATED PRODUCT DESIGN
    Bye, Robin T.
    Osen, Ottar L.
    Pedersen, Birger Skogeng
    Hameed, Ibrahim A.
    Schaathun, Hans Georg
    [J]. PROCEEDINGS - 30TH EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2016, 2016, : 534 - 543
  • [8] Research and Design of Intelligent Substation Network Security Scheme
    Chang, Liu
    Wang, Jin
    Huang, Jie
    Li, Jing
    Tian, Li
    Yu, Kaiming
    Su, Lei
    Zhou, Liang
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION ENGINEERING (ICECE 2019), 2019, : 358 - 363
  • [9] Research on Intelligent Flowmeter Calibration Software System Design
    Chen, Jiujun
    Sha, Yongzheng
    Cheng, Ting
    Xiao, Gang
    Mao, Jiafa
    [J]. APPLIED MECHANICS AND MATERIALS I, PTS 1-3, 2013, 275-277 : 2560 - 2564
  • [10] The Research and Design of Intelligent Card Free Bus Software
    Dang, Jiangtao
    Fu, Bo
    Mi, Fei
    Quan, Xin
    Zhang, Yao
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON SENSOR NETWORK AND COMPUTER ENGINEERING, 2016, 68 : 45 - 49