期刊文献+

基于免疫机制的蠕虫检测防御系统 被引量:3

Worm Detection and Prevention System Based on Immunity
下载PDF
导出
摘要 当今的蠕虫检测防御系统都是被动的检测防御系统,只能进行事后处理,不能检测和防御未知蠕虫。生物免疫系统是一个高度复杂的分布协调自适应系统。由于蠕虫具有生物病毒特征,所以作者借鉴生物免疫系统来构建一个基于免疫机制的蠕虫检测防御系统,该系统将被动检测蠕虫和主动检测蠕虫相结合,既可以检测清除已知的蠕虫,又可以自适应地检测阻断部分未知蠕虫,即使未阻断它,也可以触发相应的响应机制,和其它防御系统互动,共同构成有效的检测、防御、预警和防范系统。 The current worm detection and prevention system is a passive one in which unknown worms can't be detected and prevented. Biotic immune system is a highly complex system of distribution and self-adaptation. Worms are characterized by biotic viruses, so we can set up a worm detection and prevention system based on immunity via the biological immune system. This worm detection and prevention system combines passive and active worm-detecting; namely, it can detect and eliminate known worms, and can simultaneously detect and sever part of the unknown worms self-adaptively. Even though severance fails, the corresponding responsive mechanism will be triggered to interact with other prevention systems, all working to constitute an effectively detective, preventive, pre-warning and guarding system.
出处 《重庆师范大学学报(自然科学版)》 CAS 2006年第3期59-62,共4页 Journal of Chongqing Normal University:Natural Science
关键词 蠕虫 免疫 检测 防御 worm immunity detection prevention
  • 相关文献

参考文献9

  • 1SPAFFORD E H. The Intemet Worm Program: An Analysis[R]. West Lafayette: Department of Computer Science,Purdue University, 1988.
  • 2YANG S. Relations M. NSF Awards $ 5.46 Million to UC Berkeley and USC to Build Test Bed for Cyber War Games [J/OL]. http://www.berkeley.edu/news/media/releases/2003/10/15_testbed.shtml,2003.
  • 3STEVE W. Open Problems in Computer Virus Research [J/OL]. http://www.research. ibm. com/antivirus/SciPapers/White/Problem Problems. html.1998.
  • 4AMOLD B,CHESS D,MORAR J,et al. An Environment for Controlled Worm Replication and Analysis [R]. United Kingdom : Oxfordshire, 2000.
  • 5SONG D, MALAN R, STONE R. A Snapshot of Global In-ternet Worm Activity [ J/OL]. http://www. first.org/events/progconf/2002/d5- 02-song-slides. pdf.2001.
  • 6CHUNG S, HOAGLAND J, LEVITT K, et al. The Design of GRIDS : A Graph-based Intrusion Detection System[J/OL].http://citeseer.nj.nec.com/cheung -99design. html.1999.
  • 7LOCKWOOD J W, MOSCOLA J, KULIG M, et al. Interact Worm and Virus Protection in Dynamically Reeonfigurable Hardware[A]. In:Proc. of the ACM CCS Workshop on Rapid Malcode ( WORM 2003 ) [C]. Washington : Military and Aerospace Programmable Logic Device (MAPLD),2003.
  • 8MORRISON. Honeypot Technology [J/OL]. http//www.xfocus. net/articles/200103/121.html,2001.
  • 9CERT/CC. CERT Incident Note IN-2001-05 [J/OL]. http :// www. cert. org/ incident_ notes/IN-2001-05. html.2001.

同被引文献26

  • 1李哲,封汉颍.一类改进的计算机病毒传播模型[J].微计算机信息,2008,24(12):64-66. 被引量:3
  • 2李晓丽,王丽娜.网络中的计算机病毒传播模型[J].计算机工程,2005,31(18):153-155. 被引量:19
  • 3张宁,张丹荣,杨建民.有限资源条件下网络病毒的阻断策略[J].上海理工大学学报,2007,29(3):250-254. 被引量:4
  • 4马知恩;周义仓.传染病动力学的数学建模与研究[M]北京:科学出版社,2004.
  • 5Ren J,Yang X,Zhu Q. A novel computer virus model and its dynamics[J].Nonlinear Analysis:Real World Applications,2012.376-384.
  • 6Misha B K,Pandey S K. Dynamic model of worms with vertical transmission in computer network[J].Applied Mathematics and Computation,2011.8438-8446.
  • 7Han X,Tan Q L. Dynamical behavior of computer virus on Internet[J].Applied Mathematics and Computation,2010.2520-2526.
  • 8Li M Y,Muldowney J S. A geometric approach to the global stability problems[J].SIAM Journal on Mathematical Analysis,1996,(04):1070-1083.
  • 9Martin J R H. Logarithimic norms and projections applied to linear differential systerm[J].Journal of Mathematical Analysis and Applications,1974,(45):432-454.
  • 10Wierman J C,Marchette D J.Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction[J].Computational Statistics and Data Analysis,2004,45(1):3-23.

引证文献3

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部