期刊文献+

计算机免疫应用研究 被引量:3

Research on Application of Computer Immunology
下载PDF
导出
摘要 主要介绍了计算机免疫在网络安全方向的几个应用领域:生物启发的病毒检测、生物启发的入侵检测、生物启发的风险评估以及神经网络和遗传算法在入侵检测研究中的应用.首先介绍人体免疫系统的安全机制及特性;其次总结生物启发的病毒检测的相关工作及分布式计算机病毒免疫系统(distributed computer virus immune system, CVIS)的工作原理及系统结构;再次描述生物启发的入侵检测的研究现状及相邻比特匹配规则,简述生物启发的风险评估;然后阐述了神经网络在误用检测中的应用以及遗传算法的适应函数;最后指出计算机免疫的研究方向.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期403-408,共6页 Journal of Computer Research and Development
基金 高校博士点专项基金项目(20050217007) 武器装备预研重点基金项目(413150702,51416060104CB0101) 哈尔滨工程大学基础研究基金项目(HEUF4087)
  • 相关文献

参考文献25

  • 1[1]S Forrest,S A Homeyr,A Somayaji.Computer immunology.Communication of the ACM,1997,40(10):88-96
  • 2[3]林学颜,丁桂凤,等.医学免疫学.北京:人民卫生出版社,1998
  • 3[4]S Forrest,A S Perelson,L Allen,et al.Self-nonself discrimination in a computer.In:IEEE Symposium on Research in Security and Privacy,Oakland,1994
  • 4[5]J O Kephart.A biologically inspired immune system for computers[C].In:Proc of the 4th Int'l Workshop on the Synthesis and Simulation of Living Systems and Artificial Life,Cambridge:MIT Press,1994.130-139
  • 5[6]R E Marmelstein,D A Veldhuizen,G B Lamont.A distributed architecture for an adaptive CVIS.The IEEE Int'l Conf of Systems,Man,and Cybernetics,1998
  • 6[7]T Okamoto,Y Ishida.A distributed approach to computer virus detection and neutralization by autonomous and heterogeneous agents.In:Proc of the 4th Int'l Symposium on Autonomous Decentralized System.Los Alamitos:IEEE Computer Society Press,1999.328-331
  • 7[8]T Okamoto,Y Ishida.Multiagent approach against computer virus:an immunity-based system.In:Proc of the 4th Int'l Symposium on Artificial Life and Robotics.Tokyo:Tokyo Press,1999.69-72
  • 8侯朝桢,张雅静.基于multi-agent的仿生物免疫:计算机抗病毒研究新思路[J].北京理工大学学报,2002,22(3):270-273. 被引量:5
  • 9[11]J P Anderson.Computer security threat monitoring and surveillance.James P Anderson Co.Tech Rep:79F26400,1980
  • 10莫宏伟,金鸿章.用于函数优化的改进免疫克隆多样性算法[J].哈尔滨工程大学学报,2004,25(1):76-79. 被引量:14

二级参考文献67

  • 1梁可心,李涛,刘勇,陈桓.一种基于人工免疫理论的新型入侵检测模型[J].计算机工程与应用,2005,41(2):129-132. 被引量:13
  • 2郑文岭,马文丽.生物病毒与计算机病毒[J].科技导报,1995,13(2):3-6. 被引量:6
  • 3李涛.基于免疫的网络安全风险检测[J].中国科学(E辑),2005,35(8):798-816. 被引量:40
  • 4FORREST S, JAVORNIK B, SMITH R, et al. Using genetic algorithms to explore pattern recognition in the Immune System[ J ]. Evolutionary Compuation, 1993, 1 (3): 191 -211.
  • 5SMITH R, FORREST S, PERELSON A S. Searching for diverse, cooperative populations with genetic algorithms[J].Evolutionary Compuation, 1993,1 (2) : 127 - 149.
  • 6SPEARS W M. Proc. 2nd foundations of genetic algorithms workshop (Whitley D, Ed. )[C]. San Mateo, CA: Morgan Kaufmann, 1992.
  • 7CASTRO L N,ZUBEN F J. Data mining: A heuristic approach[ M]. Hershey: Idea Group Publishing, 2001.
  • 8GOLDBERG D E. Genetic algorithms in search, optimization and machine learning[ M ]. Boston: Addison - Wesley,1989.
  • 9WIERZCHOA S T. Function optimization by the immune metaphor[ J ]. Task quarterly, 2002,6 (3) : 1 - 16.
  • 10FARMER J D, PACKARD N H, PERELSON A S. The immune system, adaptation, and machine learning, physica [J]. Physica, 1986, (22) : 187 - 204.

共引文献53

同被引文献20

  • 1张衡,吴礼发,张毓森,曾庆凯.一种r可变阴性选择算法及其仿真分析[J].计算机学报,2005,28(10):1614-1619. 被引量:43
  • 2罗文坚,曹先彬,王煦法.检测器自适应生成算法研究[J].自动化学报,2005,31(6):907-916. 被引量:17
  • 3王辰,丁洪生,付铁.MATLAB的数控机床模糊免疫PID控制仿真研究[J].机床与液压,2006,34(9):94-96. 被引量:3
  • 4Dasgupta D. An overview of Artificial Immune Systems and their Application[M]. Berlin.. Springer-Verlag, 1999.
  • 5Forrest S, Helman P. An Immunological Approach to Change Detection.. Algorithms, Analysis, and Implications[C]//Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy. 1996 : 192-211.
  • 6Forrest S,Perelson A S, Allen S, et al. Self-Nonself Discrimination in a Computer[C]//Proceedings of IEEE Symposium on Research in Security and Privacy. 1994:202 -212.
  • 7Haeseleer P D, Forrest S, Helman P. An Immunological Ap - proach to Change Detection: Algorithms, Analysis and Implications[C] // Proceeding the 1996 IEEE Symposium on Security and Privacy. 1996:110-119.
  • 8Ayara M, Timmis J, Deemos L, et al. Negative Selection:How to Generate Detectors[C]//Proceedings of 1st International Conference on Artificial Immune Systems (ICARIS-2002). 2002: 89- 98.
  • 9James Cannady,Artificial neural networks for misuse detection,Proceedings of the 1998 National Information Systems Security Conference[C],Arlington,VA,1998.
  • 10文定都.基于模糊免疫PID的电加热炉温度控制系统[J].冶金自动化,2007,31(6):43-46. 被引量:6

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部