首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 359 毫秒
1.
在CIDF(Common Intrusion Detection Franlework,通用入侵检测框架)的基础上,引入了Agent技术,提出了一种新的基于Agent的入侵检测系统模型。该模型通过静态智能Agent和移动Agent技术实现了分布式的基于主机和基于网络相结合的入侵检测,在技术上采用模式匹配和协议分析,并且采用了PGP技术和数字签名方案进一步实现了入侵检测系统自身的安全性。  相似文献   

2.
3.
基于移动Agent的分布式QoS路由研究   总被引:1,自引:0,他引:1  
该文提出了一种基于移动Agent的分布式QoS路由计算方法,该方法采用移动Agent搜索网络,寻找满足QoS请求的路径,并对选定路径进行资源预留,算法集QoS路由计算和资源预留于一体,网络中每个结点只需维持局部状态信息,引入移动Agent后,系统更具灵活性与适应性,并使系统能够同时支持尽力而为的数据传输和实时的数据传输。  相似文献   

4.
传统网络中的入侵阻止和检测等防护方法在网络结构脆弱、节点移动的移动自组网络中无法达到预期效果。将移动代理引入无线自组网络中,设计分布式入侵检测响应系统,通过多种功能的移动代理实现入侵检测功能,并在入侵检测的基础上利用移动代理跟踪、隔离入侵节点,对入侵节点做出及时响应。实验结果表明此方法节省网络节点资源、避免网络的崩溃且达到主动响应隔离入侵节点的效果,有效地检测并阻止了入侵行为。  相似文献   

5.
6.
We propose the Agent Network for Bluetooth Devices, a system that uses personal mobile devices as adaptive human-environment interfaces to supply people with ad hoc information and high-level services. The ANBD system operates with a hierarchical framework of service-providing nodes, dynamically composed and managed by mobile agents.  相似文献   

7.
基于移动Agent的安全电子拍卖系统的构建   总被引:3,自引:0,他引:3  
吴国荣  沈庆浩 《计算机工程》2003,29(11):113-115
随着电子商务技术的日益发展,移动Agent技术可以用来进行市场调查,商品买卖及离线拍卖等。事实证明只有当用移动Agent构建的系统的安全性得到确切的保证后,才能被大众用户所接受。该文提出了一个基于移动Agent的电子拍卖协议,并以此协议构建了一个实际的系统。系统中采用了主从结构,在认证过程中要求Agent向拍卖服务器出示许可证等方法来保证系统的安全性。最后,对协议设计的正确性和效率进行了详尽的分析。  相似文献   

8.
The mobile agents create a new paradigm for data exchange and resource sharing in rapidly growing and continually changing computer networks. In a distributed system, failures can occur in any software or hardware component. A mobile agent can get lost when its hosting server crashes during execution, or it can get dropped in a congested network. Therefore, survivability and fault tolerance are vital issues for deploying mobile-agent systems. This fault tolerance approach deploys three kinds of cooperating agents to detect server and agent failures and recover services in mobile-agent systems. An actual agent is a common mobile agent that performs specific computations for its owner. Witness agents monitor the actual agent and detect whether it's lost. A probe recovers the failed actual agent and the witness agents. A peer-to-peer message-passing mechanism stands between each actual agent and its witness agents to perform failure detection and recovery through time-bounded information exchange; a log records the actual agent's actions. When failures occur, the system performs rollback recovery to abort uncommitted actions. Moreover, our method uses checkpointed data to recover the lost actual agent.  相似文献   

9.
Orphan detection in distributed systems is a well-researched field for which many solutions exist. These solutions exploit well defined parent-child relationships given in distributed systems. But they are not applicable in mobile agent systems, since no similar natural relationship between agents exist. Thus new protocols have to be developed. In this paper one such protocol for controlling mobile mobile agents and for orphan detection is presented. The shadow approach presented in this paper uses the idea of a placeholder (shadow) which is assigned by the agent system to each new agent. This defines an artificial relationship between agents and shadow. The shadow records the location of all dependent agents. Removing the root shadow implies that all dependent agents are declared orphan and are eventually be terminated. We introduce agent proxies that create a path from shadow to every agent. In an extension of the basic protocol we additionally allow the shadow to be mobile.The shadow approach can be used for termination of groups of agents even if the exact location of each single agent is not known.  相似文献   

10.
This paper describes a novel approach for managing service-centric communications networks called distributed autonomic management (DAM). Current approaches to network management employ the client/server model, cooperative stationary agents, and/or non-intelligent mobile agents. The DAM model consists of communities of mobile and stationary intelligent agents in collaboration. We discuss an experiment with DAM and proceed to discuss outstanding research issues. The DAM approach uses the properties and characteristics of autonomic systems in support of managing service-oriented communications networks and protecting e-commerce and business enterprises against cyber terrorism.  相似文献   

11.
Coordinating Mobile Agents by the XML-Based Tuple Space   总被引:1,自引:0,他引:1       下载免费PDF全文
This paper presents Xspace,a programmable coordination paradigm for Internet applications based on mobile agents.The Xspace system fully exploits the advantages of the XML language and Linda-like coordination.It supports XML documents as tuple fields and multiple matching routines implementing different relations among XML documents,including those given by XML query languages,The Xspace uses Java as the implementation language;it is based on object-oriented XMLized tuple spaces to implement a portable and programmable coordination paradigm for mobile agents.The dsign and implementation procedures of Xspace are described in this paper,Experiment and performance evaluation are also made.Finally,some conclusinos and remarks are given.  相似文献   

12.
李凯  周建国  晏蒲柳 《计算机工程》2005,31(12):133-135
分析了当前几种广泛应用的安全电子邮件标准在安全机制方面的某些不足,提出了一种基于移动Agent技术的安全电子邮件系统应用方案。该方案利用功能Agent在邮件客户端和认证中心CA端之间进行双向认证、公钥管理和邮件管理,实现了邮件的保密性、认证性、完整性以及收发双方的不可否认性。  相似文献   

13.
14.
本文将采用全新的信息技术设计出满足用户需求的移动视频监控系统。该移动视频监控系统集中运用了 AI2 编程技术、H.264 视频压缩编码技术、网络传输技术、SAE云计算技术等。该系统具有移动视频在线点播和移动视频在线 采集功能,管理员可应用Windows 客户端管理网络服务器的用户信息和视频数据。  相似文献   

15.
在分析大多数工作流管理系统的现状以及移动Agent技术特点的基础上,提出一种基于移动Agent的工作流系统架构,并利用IBM的移动Agent系统——Aglet实现原型系统。该架构采用移动Agent的安全机制,同时通过RSA公开密钥加密算法保护移动A-gent所携带的信息,提高了安全性能。实践证明,基于移动Agent的工作流管理系统是可行的和先进的,能够有效地解决现有工作流管理系统中存在的效率问题和安全问题。  相似文献   

16.
针对当前移动设备无法加入Gnutella网络实现文件共享网络的现状,提出一种移动代理Gnutella网络架构的设计方案。利用移动代理作为移动设备的代理加入Gnutella网络,帮助移动设备实现文件的共享功能。架构能有效地减少移动设备的信息流量,并支持移动设备在Gnutella网络中实现可移动性。  相似文献   

17.
移动通信安全是无线电子商务正常运行的前提。随着手机移动业务的迅猛发展,无线电子商务对无线网络的安全性提出了更高的要求。实现在不可信的无线网络中进行可信的安全通信具有十分重要的现实意义。该文针对短消息在无线电子商务系统中的具体应用,设计了一个安全的消息通信系统。该系统采用1024位RSA加密短消息,并使用MD5签名保证消息的完整性。并采用认证技术来保证消息的安全性。  相似文献   

18.
提出一种基于主机和网络的分布式入侵检测系统,利用Snort作为网络信息收集器,产生网络MLSI;使用移动代理对MLSI进行融合分析,检测传统入侵检测系统不能检测到的入侵行为.对系统中各部件的功能作了说明,利用移动代理的移动性、自治性等特性来克服目前分布式入侵检测系统中存在的实时性差、灵活性有限和动态扩展能力不足的缺点.最后给出了一个检测doorknob攻击的实例.  相似文献   

19.
This paper presents an agent-based artificial immune system approach for adaptive damage detection in distributed monitoring networks. The presented approach establishes a new monitoring paradigm by embodying desirable immune attributes, such as adaptation, immune pattern recognition, and self-organization, into monitoring networks. In the artificial immune system-based paradigm, a group of autonomous mobile monitoring agents mimic immune cells (such as B-cells) in the natural immune system, interact locally with monitoring environment, and respond to emerging problems through simulated immune responses. The presented immune-inspired monitoring paradigm has been applied to structural health monitoring. The “antibody” of a mobile monitoring agent is a pattern recognition algorithm tuned to a certain type of structural damage pattern. The mobile monitoring agent performs damage diagnosis based on structural dynamic response data. Mobile monitoring agents communicate with each other and collaborate with network components based on agent interaction protocols defined in agent standards, the Foundation for Intelligent Physical Agents standards. A mobile agent system embedded in sensor nodes supports the selective generation, migration, communication, and management of mobile monitoring agents automatically. The active structural health monitoring is achieved by distributing mobile monitoring agents to the sites where they are needed. The structural damage diagnosis using mobile monitoring agents and artificial immune pattern recognition method has been tested using a scaled steel bridge structure. The test result shows the feasibility of using this approach for real-time structural damage diagnosis.  相似文献   

20.
提出了一种使用移动代理的面向服务的分布式入侵检测系统模型SOIDS(Service—oriented Intrusion Detection System).通过将服务和移动代理分布到网络上,SOIDS很好地解决了基于集中式框架的入侵检测系统面临的性能瓶颈问题.本文深入探讨了SOIDS的体系结构和消息机制,并以实例详细描述了代理和服务合作追踪检测入侵的流程.本文对实现网络安全系统的开放性,可扩展性和健壮性方面也进行了有益的探索.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号