期刊文献+

免疫技术在网络入侵中的应用

Application of Immunity Technology in Network Intrusion
下载PDF
导出
摘要 本文将入侵检测系统和人体免疫系统有机结合,提出了一个免疫网络入侵检测系统模型,利用进化原理能不断对规则库里的检测规则实施进化,使之始终保持最有效的检测规则,从而使该模型具有自适应性、动态性和准确性等特点,因此它比其它方法更能满足基于网络的入侵检测系统的要求。 With the organic combination of intrusion detection system and human body's immune system, the paper proposes a intrusion detection system model based on immunity technology. The detection rules in the rule bank can be evolved on the principle of evolution theory and always keep the most effective detection rules all along so that the model possesses features such as being self-adaptive, dynamic and accurate. Therefore, it is better than other ways to satisfy the requirements of intrusion detection system on network.
作者 邢雨
机构地区 西南科技大学
出处 《电脑与电信》 2009年第5期56-57,共2页 Computer & Telecommunication
关键词 入侵检测 免疫 基因库 intrusion detection immunity gene bank
  • 相关文献

参考文献2

二级参考文献9

  • 1何球藻 吴厚生.医学免疫学[M].上海:上海医科大学出版社,2000..
  • 2Jungwon Kim ,Peter J Bentley.Towards an Artificial Immune System for Network Intrusion Detection:An investigation of Dynamic Clonal Selection[C].In:the Congress on Evolutionary Computation(CEC-2002), Honolulu, 2002-05-12-17 : 1015 - 1020.
  • 3Junwon KJm,Peter J Bentley.Immune Memory in the Dynamic Clonal Seleetlon Algorithm[C].In:Proeeedings of the First International Conference on Artificial Immune Systems (ICARIS) Canterbury, 2002-09- 9-11:57-65.
  • 4Junwon Kim,Peter J Bentley.A Model of Gene Library Evolution in the Dynamic Clonal Selection Algorithm[C].In:Proceedings of the First International Conference on Artificial Immune Systems(ICARIS) Canterbury, 2002-09-9-11 : 57-65.
  • 5Paul K Harmer,Paul D Williams,Gregg H Gunsch et al.An Artificial Immune System Architecture for Computer Security Applications [J].IEEE Transaction on Evolutionary Computation,2002;6(3).
  • 6Stephanie Forrest,Alan S Perelson.Self-Nonself Discrimination in a Computer[C].In:IEEE Symposium on Security and Privacy,Oakland, CA, 1994-05 : 16-18,202.
  • 7Steven Andrew Hofmeyer.An Immunological Model of Distributed Detection and Its Application to Computer Security[D].PhD Dissertation.University of New Mexico, 1999.
  • 8杨向荣,宋擒豹,沈钧毅.基于行为模式挖掘的网络入侵检测[J].西安交通大学学报,2002,36(2):173-176. 被引量:5
  • 9姚立红,訾小超,黄皓,茅兵,谢立.基于系统调用特征的入侵检测研究[J].电子学报,2003,31(8):1134-1137. 被引量:17

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部