期刊文献+

免疫入侵检测系统的一种硬件实现方法研究 被引量:1

Study and Implementation of a Hardware-based System for Immunological Intrusion Detection
下载PDF
导出
摘要 介绍一种硬件实现的免疫入侵检测系统结构,阐述了主要部件的设计方法。系统中抗原提呈、检测器匹配等高强度运算均由硬件电路完成,速度远远超过用软件实现的系统。实验结果显示,该方法能获得较好的实时性能,是在线应用免疫入侵检测算法的一种较为有效的解决方案。 A novel hardware-based architecture for immunological IDS is proposed, and the design of main part is illustrated. In the architecture, the compute intensive portions are implemented with the hardware such as antigen presentation, detector matching etc. Comparing the software based system, a higher speed has been achieved. It is a good solution for real-time IDS based on immunological principle.
作者 方益明 严义
出处 《微电子学与计算机》 CSCD 北大核心 2006年第7期122-124,共3页 Microelectronics & Computer
关键词 免疫原理 入侵检测 异常检测 FPGA Immunological law, Intrusion detection, Anomaly detection, FPGA
  • 相关文献

参考文献4

  • 1Christopher R Clark,David E Schimmel.A Pattern-Matching Co-Process for Network Intrusion Detection Systems.In Proceedings of IEEE International Conference on Field-Programmable Technology (FPT),Tokyo,Japan,2003,12:68~74
  • 2刘航,戴冠中,李晖晖,慕德俊.基于FPGA的高速网络入侵检测系统[J].计算机应用,2004,24(5):33-35. 被引量:8
  • 3Stephanie Forrest,Alan S Perelson.Self-Nonself Discrimination in a Computer[C].In:IEEE Symposium on Security and Privacy,Oakland,CA,1994,05:16~18,202
  • 4Steven A Hofmery,Stephanie Forrest.Architecture for an Artificial Immune System[J].Evo-lutionary Computation,2000,7(1):45~68

二级参考文献7

  • 1Roesch M. Snort:The open source network intrusion detection system[EB/OL]. http://www.snort.org,2003-10.
  • 2Cho YH,et al. Specialized hardware for deep network packet filtering[A]. Proceedings of 12th International Conference on Field Programmable Logic and Applications[C]. 2002.
  • 3Altera Corporation. Using APEX 20KE CAM for Fast Search Applications[EB/OL]. http://www.altera.com/literature/tb/tb56.pdf,1999-08.
  • 4Altera Corporation. Implementing High-Speed Search Applications with Altera CAM[EB/OL]. http://www.altera.com/literature/an/an119.pdf,2001-07.
  • 5Li SM,Torresen J,Soraasen O. Exploiting Reconfigurable Hardwarefor Network Security[A]. 11th Annual IEEE Symposium on Field-Programmable Custom Custom Computing Machines[C]. Napa,California2003.
  • 6Gokhale M,et al. Granidt:Towards Gigabit Rate Network Intrusion Detection Technology[A]. Proceedings of 12th International Conference on Field Programmable Logic and Applications[C]. SSpringer-Verlag,2002.
  • 7Hutchings BL,Franklin R,Carver D. Assisting Network Intrusion Detection with Reconfigurable Hardware[A]. 10 th Annual IEEE Symposium on Field-Programmable Custom Computing Machines[C]. Napa,California,2002.

共引文献7

同被引文献4

  • 1FORREST S, PERELSON A S, ALLEN L, et al. Self nonself discrimination in a computer[C]//Proceedings of the IEEE Symposium on Research in Security and Privacy.Los Alamitos, CA..IEEE Computer Society Press, 1994: 202 212.
  • 2AGUILAR J. An artificial immune system for fault de tection[C]. 17th International Conference on Industrial and Engineering Applications of Artificiai Intelligence and Expert Systems. Ottowa, Canada, 2004:219-228.
  • 3LUO Wen-jian,ZHANG Ze-ming,WANG Xu-fa. A heu ristic detector generation algorithm for negative selection algorithm with hamming distance partial matching rule [C]. International Conference on Artificial Immune Sys terns. Oeiras, Portugal, 2006:229- 243.
  • 4CONZALEZ F,DASGUPTA D,GOMEZ J. The effect of binary matching rules in negative, selection[C]//Proceedings of the Genetic and Evolutionary Computation Conference. Chicago, IL: Springer-Verlag Press, 2003: 195-206.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部