期刊文献+

基于人工免疫机制的入侵检测技术

Intrusion Detection Technology Based on Artificial Immunology Mechanism
下载PDF
导出
摘要 现有网络入侵检测系统的大都不能识别未知模式的入侵,智能水平低.生物免疫系统提供了一种的健壮的、自组织、分布式的防护体系,对设计新的网络入侵检测系统具有很好的借鉴意义.详细介绍了对当前入侵检测中所应用的免疫机制. Current network intrusion detection systems have a fatal deficiency of being unable to detect new intrusive behaviors of unknown signatures and low intelligence level. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, the current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. Here we collate the used algorithms, the development of the systems and the outcome of their implementation.
作者 朱郁森 赵明
出处 《湖南城市学院学报(自然科学版)》 CAS 2004年第4期65-67,共3页 Journal of Hunan City University:Natural Science
  • 相关文献

参考文献13

  • 1[1]Denning D E. An Intrusion-Detection Model[J]. IEEE Transactions on Software Engineering, 1987, SE-13(2):222-232.
  • 2[2]De Castro L N, Von Zuben F J. Artificial Immune Systems: Part I - Basic Theory and Applications[C]. Technical Report-RT DCA 01/99, FEEC/UNICAMP, 1999.
  • 3[3]Dasgupta D. An Overview of Artificial Immune Systems and Their Applications[C]. Artificial Immune Systems and Their Applications, 1998.
  • 4[4]Forrest S, Perelson A S, Allen L, et al. Self-nonself Discrimination in a Computer[C]. Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamos, CA: IEEE Computer Society Press, 1994.
  • 5[5]Forrest S, Hofmeyr, S, Somayaji A. Computer Immunology[J]. Communications of the ACM 1997,40(10):88-96.
  • 6[6]De Castro L N, Von Zuben F J. The Clonal Selection Algorithm with Engineering Applications[C]. Proceeding of Artificial Immune SystemWorkshop, Genetic and Evolutionary Computation Conference (GECCO' 2000), 2000. 36-37.
  • 7[7]Forrest S, Hofmeyr S A, Somayaji A, et al. A Sense of Self for Unix Processes[C]. Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996.120-128.
  • 8[8]Hofmeyr S A, Somayaji A, Forrest S. Intrusion Detection System Using Sequences of System Calls[J]. Journal of Computer Security, 1998,6:151-180.
  • 9[9]Kim J, Bentley P. The Human Immune System and Network Intrusion Detection[C]. 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT '99), 1999.
  • 10[10]Kim J, Bentley P. The Artificial Immune Model for Network Intrusion Detection[C]. 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT'99), 1999.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部