期刊文献+

基于免疫的入侵防御模型研究

下载PDF
导出
摘要 本文分析了入侵防御系统与生物免疫系统的相似性,建立了二者之间的映射关系。给出了基于人工免疫的入侵防御系统的设计思想,并给出了其模型。本模型对相关研究具有一定的参考价值。
作者 陶晶
出处 《网络与信息》 2009年第7期27-27,共1页 Network & Information
  • 相关文献

参考文献2

二级参考文献18

  • 1LI Tao.An immune based dynamic intrusion detection model[J].Chinese Science Bulletin,2005,50(22):2650-2657. 被引量:17
  • 2KLEIN D. Defending against the wily surfer: web-based attacks and defenses[C]//Proceedings of the USENIX Workshop on Intrusion Detection and Network Monitoring. California, USA: [s.n], 1999.
  • 3ADEVA J J G, ATXA J M P. Intrusion detection in web application using text mining[J]. Engineering Applications of Artificial Intelligence, 2007, 20(4): 555-566.
  • 4ALMGREN M, DEBAR H, DACIER, M. A lightweight tool for detecting web server attacks[C]//Proceedings of Network and Distributed Systems Security. [S.l.]: [s.n.], 2000: 157-170.
  • 5ALMGREN M, LINDQVIST U. Application-integrated data collection for security monitoring [C]//RAID 2001, LNCS 2212. Berlin: Springer-Verlag, s2001: 22-36.
  • 6VIGNA G, ROBERTSON W, KHER V, et al. A stateful intrusion detection system for World-Wide Web servers[C]//Proceedings of the Annual Computer Security Applications Conference. [S.l.]: [s.n.], 2003: 34-43.
  • 7GARCIA V H, MONROY R, QUINTANA M. Web attack detection using ID3[C]//Proceedings of the 2nd IFIP International Symposium on Professional Practice in AI. [S.l.]: [s.n.], 2006: 323-332.
  • 8DASGUPTA D. An immunity-based technique to characterize intrusions in computer networks[J]. IEEE Transactions on Evolutionary Computation, 2002, 6(3): 281-291.
  • 9HARMER P K, WILLIAMS P D, GUNSCH G H, et al. An artificial immune system architecture for computer security applications[J]. IEEE Transactions on Evolutionary Computation, 2002, 6(3): 252-280.
  • 10FORREST S, HOFMEYR S, SOMAYAJI A. Computer immunology[J]. Communications of the ACM, 1997, 40(10): 88-96.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部