期刊文献+

基于人工免疫原理的网络安全入侵检测

下载PDF
导出
摘要 生命现象和生物的智能行为一直为人工智能研究者所关注。在网络安全面临极大挑战的今天,通过模仿生物的智能行为,借鉴生物的智能机理,涌现出了许多解决复杂问题的新方法。文章描述了自然免疫系统及人工免疫系统的免疫机理,分析了当前的入侵检测系统及其存在的缺陷,介绍了基于人工免疫原理的入侵检测系统的结构及工作原理,论述了该方法的优越之处,指出了可能存在的不足以及进一步改进的方向。
机构地区 西安通信学院
出处 《电信快报(网络与通信)》 2009年第9期34-37,共4页 Telecommunications Information
  • 相关文献

参考文献4

  • 1冯登国.网络安全与技术[M].北京:科学出版社,2003.
  • 2卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 3Dipankar Dasgupta. Immunity-Based Intrusion Detection System: A General Framework. Proceedings of 22nd National Information Systems Security Conference (NISSC), Virginia, USA: NISSC, 1999,147-160.
  • 4Steven A. Hofmeyr, Stephanie Forrest. Immunity by Design: An Artificial Immune System. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Morgan-Kaufmann, San Francisco, CA, 1999, 1289-1296.

二级参考文献46

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz.
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999.
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208.
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002.
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html.
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992.
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/.
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144.
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm.
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998.

共引文献236

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部