期刊文献+

基于人工免疫的入侵检测改进模型研究 被引量:1

Study on Improved Model of Intrusion Detection Based on Artificial Immunization
下载PDF
导出
摘要 在前人提出的基于人工免疫的入侵检测模型的基础上,加入了抗体精度匹配阀值和粗糙匹配频度阀值以改进其算法中对于self-nonself的判断处理方法,使得对于正常的突发性网络事件也可以进行合理的判断,从而加强了对网络事件检测的灵活性,并提出了改进后的入侵检测与防御体系模型.最后通过仿真测试,证明本模型在对突发性网络事件判断的灵活性、合理性和可行性,优于前人的基于人工免疫的入侵检测模型. Based on a former invasion detection model of artificial immunization, the match values of immune body precision and rough match frequency are added to improve the self - nonself judgment and processing method of this algorithm and to enable it to carry on reasonable judgment of the common sudden network events,which also strengthens the flexibility of network event detection. An improved invasion and defensive model is then proposed. Finally, through simulation test, the flexibility, feasibility and rationality of this model on the burst network events is confirmed, which surpasses the former invasion detection model based on the artificial immune.
出处 《昆明理工大学学报(理工版)》 CAS 北大核心 2009年第1期52-56,共5页 Journal of Kunming University of Science and Technology(Natural Science Edition)
基金 四川省教育厅青年基金项目(项目编号:2006B062) 成都信息工程学院发展基金资助(项目编号:KYTZ200704)
关键词 人工免疫 入侵检测系统 防御体系 网络安全 artificial immune intrusion detection system defending system network security
  • 相关文献

参考文献15

  • 1MUKHERJEE B, HEBERLEIN L T, LEVETT K N. Network Intrusion Detection[J]. IEEE Network, 1994, 8(3) : 26 -41.
  • 2JERNE N K. Towards a Network Theory of the Immune System[ R]. Annual Immunology, 1974,125.
  • 3S FORREST, A S PERELSON, L ALLEN, et al. Self- Nonself Discrimination in a Computer[ C]/! Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, 1994.
  • 4S FORREST, S A HOFMEYR, SOMAYAJI A. Computer immunology [ J ]. Communications of the ACM, 1997,40 (10) ;88 -96.
  • 5KIM J, BENTLY P. The Human Immune System and Network Intrusion Detection[ M]. EUFIT,1999.
  • 6HOFMEYR S. An Immune Logical Model of Distributed Detection and its Application to Computer Security[ D ]. Dept of Compute Science, University of New Mexico, 1999.
  • 7KIM J, BENTLEY P. Negative Selection and Nicking by an Artificial Immune System for Network Intrusion Detection[ C ]// In: Proc. of GECCO'99, 1999.
  • 8杨向荣,沈钧毅,刘强.基于人工免疫原理的NIDS系统和有关算法设计[J].小型微型计算机系统,2004,25(3):380-383. 被引量:7
  • 9LEANDRO N DE CASTRO, JON TIMMIS. Artificial Immune Systems: A Novel Computational Intelligence Approach[ M ]. Springer - Verlag, 2002.
  • 10PERELSON A S, WEISBUCH G. Immunology for Physicists [ J ]. Review of Modem Physics, 1997,69 (4).

二级参考文献25

  • 1段海新,于雪丽,王兰佳.基于地址关联图的分布式IDS报警关联算法[J].大连理工大学学报,2005,45(z1):126-131. 被引量:4
  • 2邓贵仕,刘金峰.基于免疫原理的网络入侵检测系统的研究[J].计算机应用研究,2004,21(9):139-141. 被引量:10
  • 3[1]J P Anderson. Computer security threat monitoring and surveillance[R].Technical report. Fort Washington,Pennsylvania:James P Anderson Company, 1980.4
  • 4[2]Dorothy E Denning. An Intrusion-Detection ModeI[J].IEEE Transactions on Software Engineering, 1987.2; 13 (2): 222-232
  • 5[3]Teresa F Lunt,R Jagannathan,Rosanna Lee et al.IDES:The enhanced prototype,A real-time intrusion detection system[R].Technical Report SRI Project 4185-010,SRI-CSL-88-12,CSL SRI International,Computer Science Laboratory,SRI 1nt1.333 Ravenswood Ave.,Menlo Park,CA 94925-3493,UJSA, 1988.10
  • 6[4]D Anderson,T Frivold,A Valdes. Next-generation intrusion-detection expert system(NIDES)[R].Technical Report SRI-CSL-95-07,Computer Science Laboratory,SRI International,Menlo Park ,CA 94025-3493,USA, 1995.5
  • 7[5]Todd Heberlein,Gihan Dias,Karl Levitt et al.A network security monitor[C].In:Prnceedings of the 1990 IEEE Symposium on Research in Security and Privacy ,IEEE ,Los Alamitos ,CA ,USA :IEEE Computer Soo. Press, 1990: 296-304
  • 8[6]Mark Crosbie,Eugene H Spafford. Defending a Computer System Using Autonomous Agents[R].CSD-TR-95-022,Department of Computer Sciences, Purdue University, 1995
  • 9[7]S Staniford Chen,S Cheung,R Crawford et aI.GrIDS:A graph based intrusion detection system for large networks[C].In :Proceedings of the 19th National Information Systems Security Conference, 1996
  • 10[8]Gregory B White,Eric A Fisch,Udo W Pooch.Cooperating Security Managers:A Peer Based Intrusion Detection System[J].lEEE Network,1996; (1/2) :20~23

共引文献34

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部