Font Size: a A A

Improvement Study Of Intrusion Detection System Based On Mobile Agent

Posted on:2008-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:B F AoFull Text:PDF
GTID:2178360218952603Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet in the modern society, invasion, service refusal attack and abuse of the Internet resources are also inoperable, which makes the Internet safe of computers stand out and become a core question of information construction. To the development of large-scale Internet and invading complication, the traditional Internet safe technology exposes lots of defect.Firstly, the development and background of IDS are introduced, while the main problem and the trend of intrusion detection are also analyzed. Although the unique independence, mobility of Mobile Agent can improve the haleness, tolerableness, adaptability and expansi- bility of the intrusion detection system, which induce Mobile Agent has used for intrusion detection system, it is necessary to improve on the intrusion detection system which base on Mobile Agent for questions faced the intrusion detection system.Secondly, after analyzing the intrusion detection system of Mobile Agent, this system model is constructed by two module (administration module and surveillance module) and four Agent (info Collection Agent, Analysis Agent, Track Agent and Management Controlling Agent) the operation surrounding of which is removal flat of IBM Aglet as Agent, of which the communication mechanism is double center (info Collection Agent and Management Controlling Agent)communication model at administrative level and three phase(data collection phase, data analysis phase and controlling management phase)in order to ensure the safety of system and decrease data transmission. Furthermore, it is also can combine the intrusion detection technology both of host computer and of internet and improve the ability of systemic detection.At last, the intrusion detection system of Mobile Agent is designed and implemented, the validity of which is proved by experiment at aspects of integrality, expansibility and safety.
Keywords/Search Tags:Network Security, Intrusion Detection, Mobile Agent
PDF Full Text Request
Related items