期刊文献+

一种基于免疫多代理的网络入侵检测模型 被引量:1

A NETWORK INTRUSION DETECTION MODEL ON IMMUNE MULTI-AGENT BASIS
下载PDF
导出
摘要 将生物免疫机理引入到网络入侵检测技术中,构建了一个基于免疫Multi-Agent的网络入侵检测模型。该模型采用没有控制中心的并行ImA检测模式,在检测时,各ImA在网络的各个节点间流动,既相对独立又相互协作。该模型是一个开放的系统模型,具有较强的伸缩性,与其它网络入侵检测模型相比,增强了可适应性、健壮性、自治性和可扩展性等。 A network intrusion detection model was built on Immune Multi-Agent (IMA)basis with the biologic immunity mechanism im- ported to the detecting technology. The concurrent ImA detection mode without control centre was applied to the model to enable each ImA roaming among the nodes in network independently while in mutual collaboration when making the detection. As an open system the proposed model is more retractile than other models as well as having the increased adaptability, robustness, autonomy and scalability.
作者 李冬
出处 《计算机应用与软件》 CSCD 北大核心 2008年第5期251-252,261,共3页 Computer Applications and Software
基金 江苏省"网络与信息安全"重点实验室(BM2003201)的资助
关键词 免疫代理 检测元 网络入侵 Immune agent Detector Network intrusion
  • 相关文献

参考文献5

  • 1J Kim,J B Peter. Towards an artificial immune system for network intrusion detection : an investigation of dynamic clone selection. Proceeding of World Congress on Computation Intelligence [ C ]. Piscataway: IEEE Press, 2002.
  • 2陈慰峰,医学免疫学[M].第三版.北京:人民卫生出版社,2001.
  • 3蔡学军,杨大鉴.基于可移动代理技术的入侵检测系统[J].计算机工程与应用,2000,36(8):117-119. 被引量:17
  • 4M Kaiser, R Dillmann, H Friedrich, etal. Learning coordination skills in multi-agent system [ A]. IEEE/RSJ Int Conf on Intell Robots & Syst, Osaka, 1996,3 : 1488-1495.
  • 5周建国.网络入侵检测的免疫学建模及其仿真研究[M].北京航空航天大学出版社,2002.

二级参考文献7

  • 12.Smaha S E.Haystack An intrusion detection system.In IEEE Four- th Aerospace Computer Security Applications Conference,USA:Or- lando,FL,Dec.1988
  • 23.Levitt K N,Heberlein L T,Mukherjee B.A method to detect intru- sive activity in a networked environment.In 14th National Computer Security Conference,Washington,DC,USA:Oct.1991:362-371
  • 34.Pagurek B,White T,Bieszczad A.A Network modeling for manage- ment applications using intelligent mobile agents.Journal of Network and Systems Management,September 1999;7(3)
  • 45.Vigna G,Fuggetta A,Picco G P.Understanding code mobility.IEEE TRANSACTIONS On Software Engineering,1998;24(5):342-361
  • 56.Picco G P,Baldi M.Evaluating the tradeoffs of mobile code design paradigms in network management applications.In the 20th Interna- tional Conference on Software Engineering ICSE'98,Kyoto,Japan: IEEE CS Press,April 1998
  • 67.Lane T,Brodley C E.Temporal sequence learning and data reduc- tion for anomaly detection.In Proceedings of the Fifth ACM Confer- ence on Computer and Communications Security,1998:150-158
  • 78.Bishop M,Dilger M.Checking for race conditions in file accesses. Computing Systems,Spring 1996;9(2):131-152

共引文献19

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部