Task assigning mechanism for large-scale distributive invasion detecting system

An intrusion detection system and task assignment technology, applied in the field of network security, can solve the problems of huge data volume, large data flow, and high scale expansion speed

Inactive Publication Date: 2008-04-30
BEIJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 2. Fast attack speed: After the attacker compromises multiple hosts, the scale of the attack increases exponentially, and the scale of the attack expands at a very high speed
[0011] 3. Large data traffic: When the compromised host sends out attacks at the same time, the amount of data in the network is very large, and even blocks the entire network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Task assigning mechanism for large-scale distributive invasion detecting system
  • Task assigning mechanism for large-scale distributive invasion detecting system
  • Task assigning mechanism for large-scale distributive invasion detecting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention is specifically divided into four parts, which are respectively the naming rules of agents, the communication mechanism between agents, the message format of communication between agents and the specific description of the task assignment method. The present invention is achieved by the following measures.

[0052] First of all, the present invention is proposed for a four-layer structure of a large-scale distributed intrusion detection system. This four-layer structure is respectively a data collection layer, a data analysis layer, a data fusion layer and a coordination management layer according to the data flow from the lower layer to the upper layer. The four layers complete specific functions accordingly. An important module—the coordination module is located in the coordination management layer. Its main job is to control and manage agents in real time, complete the process of cloning, migrating and recycling mobile agents, and use and manage ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In large-scale high speed network, the invasion detecting system adopts always hierarchical distributive structure including dispersive acquisition, distributive processing and concentrated management. In the hierarchical modular structure, deputy technology is always adopted and the coordinating module in the coordinating management layer assigns and controls the deputies. In abnormal case that the static deputy in the lower layer can not settle, some request is sent to the coordinating module, and the coordinating module assigns movable deputy with specific function to the static deputy for complete the task before the cancel request is sent and the cancel command is sent separately to finish the assignment mechanism. The mechanism can balance the system load, respond timely, complete specific data processing function and make the movable deputy controllable.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a method for real-time control of a mobile agent by a coordination module in a distributed large-scale intrusion detection system based on mobile agent technology. Background technique [0002] The wave of global informatization represented by the Internet is deepening day by day, the application of information network technology is becoming more and more popular and extensive, and the application level is deepening. The application field is gradually expanding from traditional and small business systems to large and key business systems. Typical such as Party and government department information system, financial business system, enterprise business system, etc. The development of an open, free and internationalized Internet has brought revolutionary reform and openness to government agencies, enterprises and institutions, enabling them to use the Internet to improve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/44G06F17/00
Inventor 褚永刚江为强魏战松杨义先
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products