期刊文献+

基于人工免疫的网络安全监控模型研究 被引量:1

Research on Model of Network Security Monitor based on Artificial Immune
下载PDF
导出
摘要 将人工免疫原理应用到网络安全监控的研究中,进行了基于人工免疫的网络异常数据包的检测与控制,以弥补现有网络入侵检测系统、防火墙系统不足,建立了网络安全的监测、安全控制的计算模型. The paper introduces artificial immune theory in research of network security monitor, realizes detection and control of abnormity packets in networks based on artificial immune theory, resolves the issues in current network intrusion detection system and firewall system, and modelings network security monitor and control.
作者 黄科军
出处 《青海师范大学学报(自然科学版)》 2010年第2期70-72,共3页 Journal of Qinghai Normal University(Natural Science Edition)
关键词 人工免疫 入侵检测 网络安全监控 网络安全 artificial immune system intrusion detection network security monitor network security
  • 相关文献

参考文献7

二级参考文献34

  • 1[1]Balasubramaniyan J S. An Architecture for Intrusion Detection Using Autonomous Agents. COAST Techical Report, 1998-05
  • 2[2]Barrus J. A Distributed Autonomous-agent Network-Intrusion Detection and Response System. Procedings of the 1998 Command and Control Research and Technology Symposium,Monterey CA,1998
  • 3[3]Crosbie M, Spafford G. Active Defense of a Computer System Using Autonomous. Technical Report ,Dept. of Computer Sciences,Purdue University,1995
  • 4徐晓帆.基于免疫的入侵检测模型与通信应用研究[J].微计算机信息,2007,23(20):220-222. 被引量:3
  • 5Forrest S, Perelson A. Self-nonself Discrimination in a Computer[C].Proceeding of 1994 IEEE Symposium on Research in Security and Privacy, Los Alamos, CA: IEEE Computer Society Press,1994:202-212.
  • 6Hofmery S, Forrest S. Architecture for an Artificial Immune System[J]. Evolutionary Computation, 2000,7(1):45-68.
  • 7Kim J, Bentley P. An Artificial Immune Model for Network Intrusion Detection[C].7^th European Conference on Intelligent Techniques and Soft Computing (EUFIT'99), Aachen, Germany, 1999:13-19.
  • 8Kim J, Bentley P. An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection[C].Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2001),2001: 1330-1337.
  • 9D'haeseleer P, Forrest S, Helman P. An Immunological Approach to Change Detection: Algorithms, Analysis and Implications[C]. In Proceeding of the 1996 IEEE Symposium on Computer Security and Privacy, IEEE Press, 1996: 110-119.
  • 10Kim J, Bentley P. Negative Selection and Niching by An Artificial Immune System for Network Intrusion Detection[C]. In GECCO-99 Proceedings, 1999:149-158.

共引文献58

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部