Design and implementation of distributed intrusion detection system for enterprise network

被引:0
|
作者
机构
来源
| 2005年 / Wuhan University of Technology, Wuhan, China卷 / 29期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
This paper presents a new-style, effective design of distributed intrusion detection system, which owns self-security and meets the requirement of enterprise network, by combining the method of independent analysis, storage and safely zone-building. This design can directly be applied to intrusion detection system or products and it can expand dynamically.
引用
收藏
相关论文
共 50 条
  • [11] A Distributed Network-Sensor Based Intrusion Detection Framework in Enterprise Networks
    Zhang, Difan
    Yu, Wei
    Hardy, Rommie
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1195 - 1200
  • [12] Design of a cooperative distributed intrusion detection system for AODV
    Minh, Trang Cao
    Kong, Hyung-Yun
    UBIQUITOUS CONVERGENCE TECHNOLOGY, 2007, 4412 : 252 - +
  • [13] Design and Implementation of RSSI Based Intrusion Detection System for RPL based IoT Network
    Deshmukh-Bhosale, Snehal
    Sonavane, S. S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (12): : 19 - 27
  • [14] Design and Implementation of intrusion detection punctual response system
    Lou, Yafang
    Zhang, Dongna
    Lv, Zhe
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1709 - 1712
  • [15] A distributed neural network learning algorithm for network intrusion detection system
    Liu, Yanheng
    Tian, Daxin
    Yu, Xuegang
    Wang, Jian
    NEURAL INFORMATION PROCESSING, PT 3, PROCEEDINGS, 2006, 4234 : 201 - 208
  • [16] Design and Implementation of Enterprise Network Information Monitoring System
    He, Xingao
    Yao, Bo
    Gao, Wei
    2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II, 2009, : 326 - 330
  • [17] Distributed Network Intrusion Detection System: An Artificial Immune System Approach
    Igbe, Obinna
    Darwish, Ihab
    Saadawi, Tarek
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 101 - 106
  • [18] Attack classification research and a distributed network intrusion detection system
    Wang, X.-C.
    Liu, E.-D.
    Xie, X.-Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2001, 38 (06): : 727 - 734
  • [19] A distributed network intrusion detection system with active surveillance agent
    Zeng, Bin
    Yao, Lu
    Wang, Rui
    Telkomnika - Indonesian Journal of Electrical Engineering, 2013, 11 (10): : 6258 - 6266
  • [20] Design and implementation of distributed vulnerability detection system
    Hua, Qing
    Gao, Ling
    Zhang, Lin
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2008, 38 (SUPPL. 1): : 94 - 99