期刊文献+

一种基于人工免疫的网络安全实时风险检测方法 被引量:30

A Real-Time Method of Risk Evaluation Based on ArtificialImmune System for Network Security
下载PDF
导出
摘要  依据人体免疫系统中抗体浓度的变化与人体生病的严重程度的对应关系,本文提出了一种基于人工免疫的网络安全实时风险检测的方法,给出了自体、非自体、抗体和抗原实现方式,建立了抗体的克隆选择、学习机制以及生命周期模型,提出了基于抗体浓度的网络安全风险的定量计算模型.实验表明该方法具有定量计算、实时性等优点,是网络安全实时风险检测的一个较好的解决方案. <Abstrcat>With the relationship between the antibody concentration and the degree of illness in the human immune system,a real-time method of risk evaluation for network security based on artificial immune system is proposed.Self,nonself,antibody and antigen are defined.Thus clone selection,learning scheme and lifecycle of antibody are built.A quantitative computation model based on the concentration of the antibodies for computer network security has thus been presented.The experiment shows that this method has the features of quantitative calculation and real-time process ability,and is a good solution for real-time risk evaluation for network security.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第5期945-949,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60373110) 教育部博士点基金项目(No.20030610003)
关键词 人工免疫 网络入侵检测 风险评估 artificial immune network intrusion detection risk evaluation
  • 相关文献

参考文献16

  • 1National Computer Security Center,Dept.of Defense,no.DoD 5200.28.STD,Trusted computer system evaluation criteria[S].
  • 2ISBN 92-826-7024-4,Information technology security evaluation criteria:provisional harmonized criteria[S].
  • 3ISO/IEC 15408,Common criteria for information technology security evaluation (CC v2.1)[S].
  • 4P D Goldis.Questions and answers about tiger teams[J].EDPACS,The EDP Audit,Control and Security Newsletter,1989,27(4):1-10.
  • 5E Jonsson,T Olovsson.A quantitative model of the security intrusion process based on attacker behavior[J].IEEE Trans on Software Engineering,1997,23(4):235-245.
  • 6R Ortalo,Y Deswarte,M Kaniche.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Trans on Software Engineering,1999,25(5):633-650.
  • 7B B Madan,K Goeva-Popstojanova,K Vaidyanathan,et al.Modeling and quantification of security attributes of software systems[A].In Proc Int Conf on Dependable Systems and Networks(IPDS stream)[C].Washington,DC,2002,2:505-514.
  • 8李辉,蔡忠闽,韩崇昭,管晓宏.基于信息融合的入侵检测模型与方法[J].小型微型计算机系统,2003,24(9):1602-1606. 被引量:9
  • 9C K Chu,M Chu.An integrated framework for the assessment of network operations,reliability,and security[J].Bell Labs Technical Journal,2004,8(4):133-152.
  • 10S A Hofmeyr and S Forrest.Immunity by design:an artificial immune system[A].Proc of the Genetic and Evolutionary Computation Conference (GECCO)[C].Morgan-Kaufmann,San Francisco,1999.1289-1296.

二级参考文献14

  • 1Fox K L,Henning R R, Reed J H, et al. A neural network approach toward intrusion detection[C].In : Proceedings of the 13th National Computer Security Conference, 1990,10.
  • 2Porras P. Kemmerer R. Penetration state transition analysis -a rule based intrusion detection approach[C].In:Proceedings of the Eight Annual Computer Security Application Conference, 1992.220-229.
  • 3Ming-Yuh Huang,Robert J.Jasper.A large scale distributed intrusion detection framework based on attack strategy analysis[]]. Computer Networks 1999,31. 2465-2475.
  • 4Tim Bass Intrusion Detection System -. Multisensor Data Fusion:Create Cyberspace Situational Awareness[J]. Communication of the ACM. 2000,43(4) ,99-105.
  • 5Mitiche A. Aggarwal JK multsi sensor integration/fusion through image processing : Arevial[J]. Optical Engineering. 1986,25 (3) :380-386.
  • 6Eugene Charniak Bayesian. Networks without tears[J]. AI Magazine,Winter 1991, 50-63.
  • 7Zhang yan-duo,Hong bing-rong. Recognition to the robot football from the view of information fusion[J]. Robots and Application,2001,1(1):33-35.
  • 8Kang yao-hong. Theory and application of data fusion[M]. Xi'an, XDUP 1999.
  • 9White F. A model for data fusionCC3. SPIE Conference on Sensor Fusion Orlando,FL. April, 1988.
  • 10Julia Allen, Alan Christie, William Fithen,John McHugh,Jed Pickel, Ed Stoner. State of the practice of intrusion detection technologies[R]. Networked Systems Survivability Program,Technical Report CMU/SEI-99-TR-028 ESC-99-028.

共引文献8

同被引文献207

引证文献30

二级引证文献171

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部