Abstract :
With the development and application of the information technology, the connotation of network and information security is constantly extended, from the initial information confidentiality to the integrity, availability, controllability and non-repudiation, further to the basic theory and application technology of “attack, prevention, detection, control, management, assessment” and other aspects. This paper describes the application of the mobile agent in distributed intrusion detection system, proposes and designs a distributed intrusion detection system based on mobile agent and protocol analysis, and introduces the system architecture and describes the various system components in detail.
Keywords :
computer network security; mobile agents; protocols; distributed intrusion detection system; information security; mobile agent; network security; protocol analysis; structure design; Application software; Computer security; Control systems; Intrusion detection; Libraries; Mobile agents; Network servers; Network topology; Protection; Protocols; distributed model; mobile agent; network security;