Abstract
Distributed intrusion detection system, as a kind of important security defense technology, is widely used in all kinds of information network system. In this thesis, the detection overhead host node values are determined by application of exponential scale method, through the qualitative judgment and quantitative calculation. A distributed election algorithm is also proposed, master control center elected by the actual cost of the value of nodes, which greatly improve the overall defense capability of intrusion detection system. The main control center of the election can optimizer such key factors as reliabilities of current network bandwidth, link and detection subsystem performance at real-time, and make the system resources obtain the reasonable use, and greatly improve the overall defense capability of intrusion detection system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hochbeig, J., Jackson, K., Stallings, C., et al.: NADIR: An automated system for detecting network intrusion and misuse. Computer and Security 12(3), 235–248 (1993)
Peng, N., Jajodia, S., Wang, X.Y.: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25, 1374–1391 (2002)
Strain, R.W.: Property-Liability Insurance Accounting. The College of Insurance, New York (1981)
Xu, Z., Da, Q.: Analysis and comparison of two methods for improving consistency of judgment matrix. Journal of Southeast University 32(6), 913–916 (2002). (in Chinese)
Wang, H.: Application of Possibility and Satisfiability in the Multi-objective Decisions. Information and Control 10(5), 8–12 (1981). (in Chinese)
Wu, H.: A Distributed Algorithm for the Election of a Leader in General Distributed Systems. J. Huazhong Univ. of Sci. & Tech. 2(2), 116–119 (1994). (in Chinese)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wang, W., Yang, Zm., Peng, G. (2015). Research on the Application of Distributed Intrusion Detection System Based on Election Algorithm. In: Zu, Q., Hu, B., Gu, N., Seng, S. (eds) Human Centered Computing. HCC 2014. Lecture Notes in Computer Science(), vol 8944. Springer, Cham. https://doi.org/10.1007/978-3-319-15554-8_55
Download citation
DOI: https://doi.org/10.1007/978-3-319-15554-8_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15553-1
Online ISBN: 978-3-319-15554-8
eBook Packages: Computer ScienceComputer Science (R0)