期刊文献+

计算机免疫系统中沙盒主机的构建 被引量:5

Construction of sand box in computer immune system
下载PDF
导出
摘要 为提高系统的安全性,介绍了一种仿生物免疫系统设计的计算机系统安全模型GECISM(generalcomputerimmunesystemmodel),该模型由不同的代理构成,各代理模拟相应免疫细胞的功能,在此基础上提出了沙盒主机代理的构建方案. In order to improve the system security, this paper introduces a computer security model imitating the principle of nature immunity-GECISM(general computer immune system model). This model is composed of agents,which imitate the functions of the corresponding immune cells. Based on this model, the constructional project of the sand box agent is proposed.
出处 《大连理工大学学报》 EI CAS CSCD 北大核心 2003年第z1期9-11,共3页 Journal of Dalian University of Technology
关键词 计算机免疫 代理 安全 知识库 computer immune agent security knowledge base
  • 相关文献

参考文献8

  • 1[1]FORREST S, HOFMEYR S, SOMAYAJI A. Computer immunology [J]. Commun ACM, 1997,40(10): 88-96.
  • 2[2]SOMAYAJI A, HOFMEYR S, FORREST S. Principles of a computer immune system [A]. New Security Paradigms Workshop [C]. [s l]:ACM Press, 1998.
  • 3[4]HOFMEYR A, FORREST S. Architecture for an artificial immune system[J]. Evol Comput, 2000, 7(1) :45-68.
  • 4[5]FORREST S, PERELSON A, ALLEN L, et al. Self-nonself discrimination in a computer [A]. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy [C]. Los Alamitos: IEEE Computer Society Press, 1994. 202-212.
  • 5许勇,刘波.知识库背景下分布式IDS的结构和运行机制[J].计算机工程与设计,2002,23(1):26-28. 被引量:2
  • 6许一震,王永成,沈洲.一种快速的多模式字符串匹配算法[J].上海交通大学学报,2002,36(4):516-520. 被引量:29
  • 7朱承,曹泽文,张维明.知识库系统建模框架的发展与现状[J].计算机工程,2002,28(8):3-5. 被引量:36
  • 8[1]Wu J.分布式系统设计 [M].高传善译.北京:机械工业出版社,2001.

二级参考文献32

  • 1[1]Davis R, Buchanan B,Shortcliffe E H.Production Rules as a Represen-tation for a Knowledge-base Consultation Program. Artificial Intellig-ence, 1977,8( 1 ): 15~45
  • 2[2]Clancey W J.The Knowledge Level Reinterpreted: Modeling How Systems Interact. Machine Learning, 1989,4(5):285~291
  • 3[3]Morik K.Underlying Assumptions of Knowledge Acquisition as a Process of Model Refinement. Knowledge Acquisition, 1990,2( 1):21~49
  • 4[4]Newell A.The Knowledge Level.Artificial Intelligence,1982,18(2):87-127
  • 5[5]Clancey W J.Heuristic Classification.Artificial Intelligence, 1985,27(3):289~350
  • 6[6]Marcus S.Automating Knowledge Acquisition for Experts Systems.Kluwer Academic Publisher, Boston, 1988
  • 7[7]Marcus S.SALT:A Knowledge Acquisition Tool for Propose-and-Revise Systems.In:Marcus S(ed).Automating Knowledge Acquisition for Experts Systems. Kluwer Academic Publisher, Boston, 1988
  • 8[8]Chandrasekaran B,Johnson T R,Smith J W.Task Structure Analysis for Knowledge Modeling. Communications of the ACM, 1992,35(9): 124~137
  • 9[9]Schreiber A T,Wielinga B J.Hoog R D,et al.CommonKADS:A Comprehensive Methodology for KBS Development. IEEE Expert,1994,(12):28-37
  • 10[10]Angele J,Fensel D,Studer R.Developing Knowledge-based Systems with MIKE.to Appear in Journal of Automated Software Engineering,1998

共引文献65

同被引文献22

  • 1王凤先,曾斌,张海帆,常卓.计算机免疫系统中沙盒主机的负载平衡[J].河北大学学报(自然科学版),2005,25(4):434-438. 被引量:1
  • 2程伟,卢泽新,王宏.一种新的服务器集群系统负载均衡技术[J].计算机工程与科学,2006,28(2):31-32. 被引量:8
  • 3Barroso I. A, Dean J, HOlzle U. Web search for a planel : the google clusler architecture[J]. IEEE Micro, 2003, 23(2):22-28.
  • 4Chang F. Dean J, Ghernawat S, et al. A distributed storage system for structured data[C].//7th USENIX Symp. on Operaling Systems Design and Implementation. Berkeley: USENIX Association, 2006:205 218.
  • 5Dean J, Ghemawat S. Distributed programming with Mapreduce[M]. Sebastopol: O'Reilly Media, Inc., 2007 .371 - 384.
  • 6Sims K. IBM introduces ready-lo-use cloud computing collaboration services gel clients started with cloud computing[EB/OL] [2007- 10- 16]. http: //www-03. ibm. com/press/us/en/pressrelease/22613, wss.
  • 7Boss G, Malladi P, Quan I), et al. Cloud computing [EB/OL]. [2007 09 18]. http: //download. boulder. ibm. con/ibmdl/puh/software/dw/wes/hipods/Cloud computing_wp_final 8Oct. pdf.
  • 8Hohl F. Time limited blackbox security: protecting mobile agents from malicious hosts [M]. New York: Springer-Verlag, 1998.
  • 9Sander T, Tschudin C F. Protecting mobile agents against malicious hosts[J]. Mobile Agents and Security, Lecture Notes in Computer Science, 1998, 1419:44 - 60.
  • 10张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部