Skip to main content

Research on the Application of Distributed Intrusion Detection System Based on Election Algorithm

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8944))

Included in the following conference series:

  • 3969 Accesses

Abstract

Distributed intrusion detection system, as a kind of important security defense technology, is widely used in all kinds of information network system. In this thesis, the detection overhead host node values are determined by application of exponential scale method, through the qualitative judgment and quantitative calculation. A distributed election algorithm is also proposed, master control center elected by the actual cost of the value of nodes, which greatly improve the overall defense capability of intrusion detection system. The main control center of the election can optimizer such key factors as reliabilities of current network bandwidth, link and detection subsystem performance at real-time, and make the system resources obtain the reasonable use, and greatly improve the overall defense capability of intrusion detection system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hochbeig, J., Jackson, K., Stallings, C., et al.: NADIR: An automated system for detecting network intrusion and misuse. Computer and Security 12(3), 235–248 (1993)

    Article  Google Scholar 

  2. Peng, N., Jajodia, S., Wang, X.Y.: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25, 1374–1391 (2002)

    Article  Google Scholar 

  3. Strain, R.W.: Property-Liability Insurance Accounting. The College of Insurance, New York (1981)

    Google Scholar 

  4. Xu, Z., Da, Q.: Analysis and comparison of two methods for improving consistency of judgment matrix. Journal of Southeast University 32(6), 913–916 (2002). (in Chinese)

    MathSciNet  Google Scholar 

  5. Wang, H.: Application of Possibility and Satisfiability in the Multi-objective Decisions. Information and Control 10(5), 8–12 (1981). (in Chinese)

    Google Scholar 

  6. Wu, H.: A Distributed Algorithm for the Election of a Leader in General Distributed Systems. J. Huazhong Univ. of Sci. & Tech. 2(2), 116–119 (1994). (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Wuqi Wang or Zhi-min Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, W., Yang, Zm., Peng, G. (2015). Research on the Application of Distributed Intrusion Detection System Based on Election Algorithm. In: Zu, Q., Hu, B., Gu, N., Seng, S. (eds) Human Centered Computing. HCC 2014. Lecture Notes in Computer Science(), vol 8944. Springer, Cham. https://doi.org/10.1007/978-3-319-15554-8_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15554-8_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15553-1

  • Online ISBN: 978-3-319-15554-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics