期刊文献+

基于人工免疫的多Agent自适应入侵检测系统

Multi-agent Network-based Intrusion Detection System Based on Artificial Immunology
下载PDF
导出
摘要 简介了入侵检测系统(IDS)的基本概念,指出了目前的入侵检测系统存在的不足。为了解决传统入侵检测系统中的不足,将人工免疫原理引入入侵检测系统。根据自然免疫系统的特点,提出建立基于人工免疫原理的多Agent网络入侵检测系统,该系统采用了基于多Agent的分布式体系结构,同时应用了阴性选择、克隆选择、基因库进化以及联想记忆等人工免疫原理,使得构造的网络入侵检测系统具有自适应性、分布性、自识别能力和可扩展性的特点。 The concepts of Intrusion Detection System (IDS) has been introduced,and the main weaknesses in current IDS has been pointed out.In order to solve the problems in existing IDS,the artificial immunology is introduced in our network-based IDS.According to the feature of human immune system,a multi-agent network-based intrusion detection system based on artificial immunology has been proposed.The system adopts the distributed architecture based on multi-agent,employs the artificial immune mechanism including negative selection,clonal selection,gene library evolution,associative memory and so on,therefore,the system has the features of adaptability,being distributed,self-recognition and extendibility.
出处 《微机发展》 2004年第8期111-113,116,共4页 Microcomputer Development
基金 湖南省教育厅青年项目(03B009)
关键词 入侵检测系统 人工免疫 自适应 多AGENT intrusion detection system artificial immunology adaptability multi-agent
  • 相关文献

参考文献10

  • 1李信满,赵宏,马士军.基于防火墙的网络入侵检测系统[J].东北大学学报(自然科学版),2001,22(5):489-492. 被引量:14
  • 2Heberlein L T.A network security monitor[A].Proceeding of the IEEE Symposium on Research in Security and Privacy [C].Oakland,CA:IEEE,1990.296-304.
  • 3肖人彬,王磊.人工免疫系统:原理、模型、分析及展望[J].计算机学报,2002,25(12):1281-1293. 被引量:209
  • 4Forrest S,Hofmeyr S A,Somayaji A.Computer Immunology[J].Communications of the ACM,1997,40(10):88-96.
  • 5Hofmeyr S A,Forrest S.Architecture for an Artificial Immune System[J].Evolutionary Computation,2000,7(1):1289-1296.
  • 6Carter J H.The immune system as a model for pattern recognition and classification[J].Journal of the American Medical Informatics Association,2000,7(3):28-41.
  • 7Timmis J,Knight T.Artificial immune system:Using the immune system as inspiration for data mining[A].Abbass H A,Sarker R A,Newton C S.Data Mining:A Heuristic Approach[C].Hershey:Idea Publishing Group,2001.209-230.
  • 8Nolfi S,Florano F.Learning and Evolution[J].Autonomous Robots,1999,7(1):89-113.
  • 9Watanabe Y,Ishida Y.Immunity-Based Diagnosis in Information Gathering Mobile Agent System[J].Proceeding of AROB 7th,2002,2(2):580-583.
  • 10Jennings N R,Sycara K,Wooldridge M.A Roadmap of Agent Research and Development[J].Journal of Autonomous Agents and Multi-agent Systems,1998,1(1):7-38.

二级参考文献68

  • 1HanJiawei Kamber M 范明等译.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 2[1]Denning D E. An Intrusion-detection model[J]. IEEE Transactions on software engineering, 1987,13(2):222-232.
  • 3[2]Liepins G E, Vaccaro H S. Intrusion detection: its role and validation[J]. Computers & Security, 1992,11:347-355.
  • 4[3]Vaccaro H S, Liepins G E. Detection of anomalous computer session activity[EB/OL]. http:∥dblp.uni-trier.de/db/conf/sp/sp1989.html.2000-09-15.
  • 5[4]Kumar S. Classification and detection of computer intrusions[D]. West Lafayette: Purdue University,1995.
  • 6[5]Debar H, Dacier M. Towards a taxonomy of intrusion-detection systems[J]. Computer Networks, 1999,31:805-822.
  • 7[6]Ravi S. Sandhu. Authentication, access control, and intrusion detection[J]. IEEE Communications, 1994,32(9):40-48.
  • 8[7]Bass T. Intrusion detection systems and multisensor data fusion[J]. Communications of the ACM, 2000,43(4):99-105.
  • 9[8]Porras P A,Kemmerer R A. A rule-based intrusion detection approach[A]. In: Gove R ed. Proceedings of the Eighth Annual Computer Security Applications Conference[C]. San Antonio: IEEE Computer Society Press, 1992.220-229.
  • 10[9]Lachiche N. Naive bayesian classifier [EB/OL]. http:∥www.cs.bris.ac.uk/research/ Machine Learning/1BC/ilp99/node2.html. 1999-06-15.

共引文献221

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部