Volume 29 Issue 10
Oct.  2003
Turn off MathJax
Article Contents
Lang Bo, Zheng Jiudan, Liu Junheet al. Research of automatic intrusion response implementation methods based on mobile agents[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(10): 901-904. (in Chinese)
Citation: Lang Bo, Zheng Jiudan, Liu Junheet al. Research of automatic intrusion response implementation methods based on mobile agents[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(10): 901-904. (in Chinese)

Research of automatic intrusion response implementation methods based on mobile agents

  • Received Date: 05 Jun 2003
  • Publish Date: 31 Oct 2003
  • To protect the system promptly and effectively when an intrusion was detected, a mobile agent based automatic intrusion response system was advanced. The response plan was automatically created and the mobile agents were sent to the hosts that are attacked to disable accounts, close ports, make the speaker aloud and shut down the host. Response agents can also reconfigure firewalls. The implementation of a response plan was monitored and the plan can be adjusted dynamically. The prototype of the system was used in the dynamic network defense system of Jinhang network. The running result shows that the mobile agent based intrusion response method is much more effective.

     

  • loading
  • [1] Carver Curtis A, Hill John M D, Surdu John R. A methodology for using intelligent agents to provide automated intrusion response . Proceedings of the IEEE Systems,Man, and Cybernetics Information Assurance and Security Workshop . West Point, NY, 2000 [2] 张云勇. 移动Agent及其应用[M]. 北京:清华大学出版社,2002 Zhang Yunyong. Mobile agent and its application[M]. Beijing:Tsinghua University Press,2002(in Chinese) [3] 张 瑾,张德贤. IBM Aglet系统研究与应用[J]. 开封:河南大学学报,2002,29(3):40~43 Zhang Jin,Zhang Dexian. Research on IBM aglets system and its application[J]. Kaifeng:Journal of Henan University,2002, 29(3):40~43(in Chinese) [4] Wang Ruchuan,Zhao Xinning. The research on mobile agent secruity[J]. The Journal of China Universities of Post and Telecommunications,2002,19(3):47~52
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3276) PDF downloads(6) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return