期刊文献+

基于免疫的网络监控模型 被引量:53

An Immune Based Model for Network Monitoring
下载PDF
导出
摘要 传统计算机免疫系统检测器训练效率低下,自体/非自体定义缺乏动态的演化机制,适应性较差,不能满足真实网络环境下网络监控的需求.有鉴于此,该文提出了一种新型的基于免疫的网络监控模型(AINM),给出了自体、非自体、抗原、检测器以及证据的形式定义,建立了自体、抗原、动态取证、免疫耐受、检测器的生命周期以及免疫记忆的动态模型及相应的递推方程,并对模型进行了仿真.实验表明这种新型的网络监控模型具有良好的多样性、实时性和自适应能力. In a traditional computer immune system(CIS), the detector training efficiency is very low, and, there is no dynamic evolutionary mechanism for self/nonself definition, resulting a lower self-adaptability, therefore, not satisfying the requirements of network monitoring in a real network environment. To solve this problem, a new immune based model, which is called AINM for computer network monitoring, is proposed. The concepts and the formal definitions of self, nonself, antigen, detector and digital evidence are introduced. Furthermore, the dynamic evolutive models and the recursive equations to the self, antigen, dynamic computer forensics, immunological tolerance, and the detector lifecycle are presented. The simulation for this model has been given. The experiment result shows that the new model has the capability of real-time, self-learning, self-adaptive and diversity.
作者 李涛
出处 《计算机学报》 EI CSCD 北大核心 2006年第9期1515-1522,共8页 Chinese Journal of Computers
基金 国家自然科学基金(60373110 60573130 60502011) 教育部新世纪优秀人才计划项目基金(NCET-04-0870) 教育部博士点基金(20030610003) 四川省科技厅应用基础研究计划项目基金(05JY029-021-1) 四川大学创新基金(2004CF10)资助
关键词 人工免疫 入侵检测 网络监控 计算机取证 计算机免疫系统 artificial immune system intrusion detection network monitoring computer forensics computer immune system
  • 相关文献

参考文献21

  • 1Butler D.. Computer security: Who's been looking at your data? Nature, 2002, 418:580-582
  • 2Albert R. , Jeong H. , Barabasi A. L.. Diameter of the worldwide Web. Nature, 1999, 401:130-131
  • 3Balthrop J. , Forrest S. , Newman M. E. J. , Williamson M.M.. Technological networks and the spread of computer viruses. Science, 2004, 304(5670): 527-529
  • 4Staniford S. , Paxson V. , Weaver N.. How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, San Francisco Marriott, 2002, 149-167
  • 5Morda D.. Public monitoring. In: Proceedings of the 16th FIRST Conference on Computer Security Incident Handling Response, Budapest, 2004, 81-88
  • 6Albert R. , Jeong H. , Barabasi A.L.. Attack and error tolerance of complex networks. Nature, 2002, 406:378-382
  • 7Klarreich E.. Inspired by Immunity, Nature, 2002, 415:468-470
  • 8Forrest S. , Perelson A. S.. Self-nonself discrimination in a computer. In; Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1994, 202-213
  • 9Hofmeyr S. , Forrest S.. Architecture for an artificial immune system. Evolutionary Computation, 2000, 8(4): 443-473
  • 10Harmer P. K. , Williams P. D. , Gunsch G. H. , Lamont G. B.An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation,2002, 6(3): 252-280

同被引文献341

引证文献53

二级引证文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部