{"title":"电子商务中的分布式入侵检测技术研究","authors":"Weijian Huang, Yan An, Wei Du","doi":"10.1109/ICACTE.2010.5579674","DOIUrl":null,"url":null,"abstract":"In this paper, we introduce research status and development trend of distributed intrusion detection technology first, then describe the frame structure of Distributed Intrusion Detection System, data acquisition module, data analysis module, decision-making and control module. Finally, we describe the application and the realization of distributed intrusion detection technology in electronic commerce. Distributed intrusion detection technology as the supplement of firewall has become an indispensable and important component of electronic commerce security.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Distributed intrusion detection technology's research in electronic commerce\",\"authors\":\"Weijian Huang, Yan An, Wei Du\",\"doi\":\"10.1109/ICACTE.2010.5579674\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we introduce research status and development trend of distributed intrusion detection technology first, then describe the frame structure of Distributed Intrusion Detection System, data acquisition module, data analysis module, decision-making and control module. Finally, we describe the application and the realization of distributed intrusion detection technology in electronic commerce. Distributed intrusion detection technology as the supplement of firewall has become an indispensable and important component of electronic commerce security.\",\"PeriodicalId\":255806,\"journal\":{\"name\":\"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)\",\"volume\":\"195 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACTE.2010.5579674\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACTE.2010.5579674","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Distributed intrusion detection technology's research in electronic commerce
In this paper, we introduce research status and development trend of distributed intrusion detection technology first, then describe the frame structure of Distributed Intrusion Detection System, data acquisition module, data analysis module, decision-making and control module. Finally, we describe the application and the realization of distributed intrusion detection technology in electronic commerce. Distributed intrusion detection technology as the supplement of firewall has become an indispensable and important component of electronic commerce security.