期刊文献+

入侵检测中基于残余抗原理论的动态记忆算法

Algorithm of dynamic memory based on residual antigen for intrusion detection
下载PDF
导出
摘要 依据生物免疫的防御层次结构,分析了网络入侵的多层防御体系。引入生物学中残余抗原理论,结合入侵检测过程中存在的残余抗原,提出了一种新的基于残余抗原理论的动态记忆算法。在此基础上,分析了算法的设计思想,给出了算法的具体实现过程。实验数据表明:该算法实现了识别器记忆的动态性和持久性,并且能够提高系统资源的利用率。 According to the defending hierarchy of biological immune system, combined with residual antigen theory of biology, making use of "residual antigen" existing in the process of antibody detecting, on the basis of analyzing of multilayer defending system applied in the network intrusion detection, a dynamical memory algorithm is designed based on the residual antigen theory. The thinking of designing this algorithm is analysed, and the process of how to carry out it is presented. The date produced from experiment indicates that the algorithm makes the dynamic and permanent of memory of the intrusion detection come true and the utilization of system resource is improved.
作者 符海东 李雪
机构地区 武汉科技大学
出处 《计算机工程与设计》 CSCD 北大核心 2007年第16期3825-3828,共4页 Computer Engineering and Design
基金 湖北省教育厅重点科研基金项目(2004D006)
关键词 入侵检测 人工免疫 残余抗原 网络安全 动态记忆 intrusion detection artificial immune residual antigen network security dynamic memory
  • 相关文献

参考文献6

二级参考文献26

  • 1E Jonsson,T Olovsson.A quantitative model of the security intrusion process based on attacker behavior[J].IEEE Trans on Software Engineering,1997,23(4):235-245.
  • 2R Ortalo,Y Deswarte,M Kaniche.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Trans on Software Engineering,1999,25(5):633-650.
  • 3B B Madan,K Goeva-Popstojanova,K Vaidyanathan,et al.Modeling and quantification of security attributes of software systems[A].In Proc Int Conf on Dependable Systems and Networks(IPDS stream)[C].Washington,DC,2002,2:505-514.
  • 4C K Chu,M Chu.An integrated framework for the assessment of network operations,reliability,and security[J].Bell Labs Technical Journal,2004,8(4):133-152.
  • 5S A Hofmeyr and S Forrest.Immunity by design:an artificial immune system[A].Proc of the Genetic and Evolutionary Computation Conference (GECCO)[C].Morgan-Kaufmann,San Francisco,1999.1289-1296.
  • 6S A Hofmeyr,S Forrest.Architecture for an artificial immune system[J].Evolutionary Computation,2000,8(4):443-473.
  • 7D Dasgupta.Immunity-based intrusion detection systems:a general framework[A].Proc of the 22nd National Information Systems Security Conference (NISSC)[C],Arlington,Virginia,1999.147-160.
  • 8D Dasgupta,F Gonzalez.An immunity-based technique to characterize intrusions in computer networks[J].IEEE Trans on Evolutionary Computation,2002,6(3):281-291.
  • 9Jungwon Kim,Peter J Bentley.The artificial immune model for network intrusion detection[A].the 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT'99)[C].Aachen,Germany,1999.
  • 10Jungwon Kim,Peter J Bentley.Evaluating negative selection in an artificial immune system for network intrusion detection[A].Genetic and Evolutionary Computation Conference 2001(GECCO-2001)[C].San Francisco,2001.1330-1337.

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部