期刊文献+

基于免疫的入侵检测方法研究 被引量:13

Study on Immune-Based Intrusion Detection Approach
下载PDF
导出
摘要 生物的免疫系统和计算机安全系统所面临及需要解决的问题十分类似,采用生物免疫思想的入侵检测技术可以结合 异常检测和误用检测的优点.研究了基于免疫的入侵检测方法,对Self集的确定和有效检测器的生成方法进行了研宛和改进, 基于反向选择机制提出了一种新的有效检测器生成算法,可以使用较少的有效检测器检测网络中的异常行为,从而提高了有效 检测器生成和入侵检测的速度.通过与基于已有的有效检测器生成算法的系统进行比较,使用本文的方法构造的入侵检测系统 速度更快,且有较高的准确性. The problems a computer security system faced and needed to solve is quite similar with those of a biological immune system. Immune based intrusion detection techniques can incorporate the advantages of both anomaly intrusion detection and misuse intrusion detection. In this paper, immune based intrusion detection approaches are studied. The methods of constructing self set and generating valid detectors are researched and improved. A novel valid detector generation algorithm is proposed based on the negative selection mechanism. According to the new algorithm, less valid detectors are needed to detect the abnormal activities in the network. Therefore, the speed of generating valid detectors and intrusion detection is improved. By comparing with those based on existing algorithms, the intrusion detection system based on the new algorithm has higher speed and is accuracy.
出处 《小型微型计算机系统》 CSCD 北大核心 2005年第10期1736-1741,共6页 Journal of Chinese Computer Systems
基金 国家"八六三"计划CIMS主题项目(2003AA414210)资助国家自然科学基金项目(60173051)资助教育都优秀青年教师科研教学奖励计划项目教育部高等学校博士学科点专项科研基金项目(20030145029)资助.
关键词 免疫 入侵检测 反向选择 SELF集 有效检测器 immune intrusion detection negative selection self set valid detector
  • 相关文献

参考文献20

  • 1Cabrera J, Ravichandran B, Mehra R K. Statistical traffic modeling for network intrusion detection[A]. Proc IEEE Int Workshop Model Anal Simul Comput Telecommun Syst[C]. Washington. D. C.: IEEE Computer Society Press, 2000, 466-473.
  • 2Lindqvist U, Porras P A. Detecting computer and network misuse through the production-based expert system toolset (PBEST) [A]. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy[C]. Washington D. C.: IEEE Computer Society Press, 1999, 146-161.
  • 3Lee S C, Heinbuch D V. Training a neural-network based intrusion detector to recognize novel attacks[J]. IEEE Trans Syst Man Cybern PT a Syst Humans, 2001,31(4): 294-299.
  • 4Lee W, Stolfo S J, Mok K W. Adaptive intrusion detection&colon: a data mining approach[J]. Artificial Intelligence Review, 2000,14(6) :533-567.
  • 5Hofmeyr S A, Forrest S. Architecture for an artificial immune system[J]. Evolutionary Computation, 2000,8 (4): 443-473.
  • 6Hofmeyr S A, Forrest S. Immunity by design: an artificial immune system[A]. Proceedings of the Genetic and Evolu-tionary Computation Conference (GECCO)[C]. San Francisco: Morgan-Kaufmann, 1999, 1289-1296.
  • 7Balthrop J, Esponda F, Forrest S et al. Coverage and generalization in an artificial immune system[A]. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002)[C]. New York: Morgan Kaufmann, 2002,3-10.
  • 8Chao D L, Forrest S. Information immune systems[A]. Proceedings of the First International Conference on Artificial Immune Systems (ICARIS) [C]. 2002, 132-140.
  • 9Hofmeyr S A. An immunological model of distributed detection and its application to computer security[D]. Albuquenque: University of New Mexico, 1999.
  • 10Dasgupta D. Immunity-based intrusion detection system: a general framework. In: Proceedings of the 22nd National Information Systems Security Conference (NISSC), 1999[EB/OL].http:∥csrc. nist. gov/nissc/1999/proceeding/papers/p11. pdf.

二级参考文献44

  • 1陈向阳 方汉.Linux实用大全[M].北京:科学出版社,1999..
  • 2[英]PM利迪亚德 A惠兰 M W范杰.林慰慈 薛彬 魏雪涛译.免疫学[M].北京:科学出版社,2001..
  • 3D' haesdeer. An immunological approach to change detection: Theoretical results. In: The 9th IEEE Computer Security Foundations Workshop. Los Alamitos, CA: IEEE Computer Society Press, 1996.
  • 4Dasgupta. An immune agent architecture for intrusion detection.GECCO 2000, Las Vegas, Nevada, USA, 2000.
  • 5Dasgupta. Immunity-based intrusion detection systems: A general framework. The 22nd National Information Systems Security Conf(NISSC), 1999. ftp://ftp, msci. memphis, edu/comp/dasgupta/papers/Immune-IDS, pdf.
  • 6Dasgupta, Gonzalez. An immunogenetic approach to intrusion detection. The University of Memphis, Tech Rep: CS-01-001,2001.
  • 7Dasgupta, Nino. A comparison of negative and positive selection algorithms in novel pattern detection. The IEEE Int'1 Conf on Systems, Man and Cybernetics (SMC), Nashville, 2000.
  • 8Kim, Bentley. The artificial immune model for network intrusion detection.The 7th EUFIT' 99, Aachen, Germany, 1999.http://www. es. ucl. ac. uk/staff/J. Kim/pub/EUFITaimmune. ps.
  • 9Kim, Bentley. The human immune system and network intrusion detection.The 7th EUFIT' 99, Aachan, Germany, 1999. http://www. cs. ud. ac. uk/staff/J. Kim/pub/EUFIThimmune. ps.
  • 10Kim, Bentley. Negative selection and niching by an artificial immune system for network intrusion detection. GECCO'99,Orlando, Florida, 1999. http://www, cs. ucl. ac. uk/staff/J. Kim/pub/GECCOLateBreak99. ps.

共引文献36

同被引文献164

引证文献13

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部