期刊文献+

检测器实时生成算法及其应用

Detector Real-time Generation Algorithm and Its Application
下载PDF
导出
摘要 基于生物免疫系统中抗体的克隆机制与亲和度变异机制,提出一种可实时改变当前检测器集合的检测器生成算法用于入侵检测系统(IDS)。理论分析和应用结果表明,该算法通过较少的检测器即可检测出大量非自体空间中的异常变化,且能降低IDS系统的漏检率和误检率,提高报警的可信性。 Based on the clone and affinity-variation of antibody in Biological Immune System(BIS),this paper presents a detector real-time generation algorithm which can change the current detector set to apply in Intrusion Detection System(IDS).Theoretical analysis and experiments show that this algorithm can require less evolution algebra to detect lots of abnormal change,reduce the false negative rate and false detection rate for IDS,and improve the alarm credibility.
作者 彭敏 唐俊
出处 《计算机工程》 CAS CSCD 北大核心 2010年第19期180-181,共2页 Computer Engineering
基金 湖南省教育厅科研基金资助项目(08D030,07D0180)
关键词 生物免疫系统 入侵检测系统 检测器生成算法 变异 Biological Immune System(BIS) Intrusion Detection System(IDS) detector generation algorithm variation
  • 相关文献

参考文献9

二级参考文献55

  • 1贺龙涛,方滨兴,余翔湛.一种时间复杂度最优的精确串匹配算法[J].软件学报,2005,16(5):676-683. 被引量:25
  • 2张衡,吴礼发,张毓森,曾庆凯.一种r可变阴性选择算法及其仿真分析[J].计算机学报,2005,28(10):1614-1619. 被引量:43
  • 3龙振洲.医学免疫学[M].北京:人民卫生出版社,1995..
  • 4戴英侠,连一峰.系统安全与入侵检测[M].北京:清华大学出版社,2000.
  • 5Zuben F J. Learning and Optimization Using the Clonal Selection Principl[C]//Proc. of the IEEE Int'l Conf. on Evolutionary Computation. [S. l.]: IEEE Press, 1999.
  • 6Hofmeyr S.A.. An interpretative introduction to the immune system. In: Cohen I., Segel L. eds.. Design Principles for the Immune System and Other Distributed Autonomous Systems. England: Oxford University Press, 2000.
  • 7Roesch M. Snort- lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, Seattle, Washington, 1999, 229~238.
  • 8Forrest S., Perelson A., Allen L.. Self-noself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Researchin Security and Priracy, Los Alamos, CA, 1994.
  • 9Kim J., Bentley J.P.. An evaluation of negative selection in an artificial immune system for network intrusion detection. In: Proceedings of the Genetic and Evolutionary Computation Conference 2001(GECCO-2001), San Francisco, 2001,  1330~1337.
  • 10Axelsson S.. The base-rate fallacy and its implications for the difficulty of intrusion detection. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, Kent Ridge Digital Labs, Singapore, 1999, 1~7.

共引文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部