Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Task assigning mechanism for large-scale distributive invasion detecting system

An intrusion detection system and task assignment technology, applied in the field of network security

Inactive Publication Date: 2004-01-21
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, on the one hand, the processing capacity there is strengthened, so that the processing capacity of a certain part adapts to the actual demand, so that the load of a certain part will not be too large; on the other hand, the mobile agent can be sent to perform special tasks, that is, The lower processing modules (which can be static agents) only have conventional processing capabilities and complete general processing tasks, but they have certain suspicion capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Task assigning mechanism for large-scale distributive invasion detecting system
  • Task assigning mechanism for large-scale distributive invasion detecting system
  • Task assigning mechanism for large-scale distributive invasion detecting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] Consider a node subsystem of a large-scale distributed intrusion detection system. A specific embodiment of the present invention can be expressed as follows.

[0090] (1) Proxy naming rules

[0091] According to the functions and tasks to be completed by the agent, the static agent is divided into four categories, that is, the data collection agent, the analysis agent, the fusion agent, and the response agent. Correspondingly, according to the tasks that the mobile agent assists the static agent to complete, it can be Mobile agents are also divided into collection mobile agents, analysis mobile agents, fusion mobile agents, and response mobile agents. According to the category and function of the agent, we adopt the following naming rules.

[0092] Static generation - S (stationary)

[0093] Mobile Agent——M(mobile)

[0094] Collection agent - C (collection)

[0095] Analysis agent——A(analysis)

[0096] Fusion agent——F(fusio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In large-scale high speed network, the invasion detecting system adopts always hierarchical distributive structure including dispersive acquisition, distributive processing and concentrated management. In the hierarchical modular structure, deputy technology is always adopted and the coordinating module in the coordinating management layer assigns and controls the deputies. In abnormal case that the static deputy in the lower layer can not settle, some request is sent to the coordinating module, and the coordinating module assigns movable deputy with specific function to the static deputy for complete the task before the cancel request is sent and the cancel command is sent separately to finish the assignment mechanism. The mechanism can balance the system load, respond timely, complete specific data processing function and make the movable deputy controllable.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a real-time control mechanism for a mobile agent by a coordination module in a distributed large-scale intrusion detection system based on the mobile agent technology. Background technique [0002] The wave of global informatization represented by the Internet is deepening day by day, the application of information network technology is becoming more and more popular and extensive, and the application level is deepening. The application field is gradually expanding from traditional and small business systems to large and key business systems. Typical such as Party and government department information system, financial business system, enterprise business system, etc. The development of an open, free and internationalized Internet has brought revolutionary reform and openness to government agencies, enterprises and institutions, enabling them to use the Internet to imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/44G06F17/00
Inventor 褚永刚魏战松杨义先
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products