期刊文献+

面向IDS的可变长检测器生成算法研究

Research on Intrusion Detection System oriented variable length detector algorithm
下载PDF
导出
摘要 在基于人工免疫的入侵检测系统(IDS)中,检测器集合直接影响检测结果的效率和准确度。针对目前基于人工免疫的IDS中检测效率和漏警率问题,提出了一种可变长检测器生成算法。该算法相对于已有的算法,降低了黑洞区域,减少了冗余检测器,提高了检测器生成效率和检测效率。给出了算法的设计思想、具体步骤以及在入侵检测系统中的具体实现。对算法的分析和实验表明,本算法用于入侵检测系统,提高了检测的准确率,降低了漏警率。同时,对各种异常检测向题具有一定的适用性。 Detector set affects efficiency and veracity of the Intrusion Detection System based on artificial immunity system. A variable length detector algorithm is presented aiming at the efficiency and false negative rate of intrusion detection system based on artificial immunity system.Compared with the other algorithms, it decreases the holes and redundancy detectors. The design thought, detail procedure and the realization in intrusion detection system are also proposed.An experimental exam and results are given to prove that this algorithm is effective in Intrusion Detection System.At the same time, the algorithm can also holds for other abnormal detector problems.
作者 张玉花 张星
出处 《计算机工程与应用》 CSCD 北大核心 2010年第33期101-103,共3页 Computer Engineering and Applications
基金 河南省教育厅自然基金项目(No.0844204826)
关键词 入侵检测系统 人工免疫 可变长检测器 检测率 intrusion detection system artificial immunity system variable length detector detection rate
  • 相关文献

参考文献6

二级参考文献58

  • 1贺龙涛,方滨兴,余翔湛.一种时间复杂度最优的精确串匹配算法[J].软件学报,2005,16(5):676-683. 被引量:25
  • 2张衡,吴礼发,张毓森,曾庆凯.一种r可变阴性选择算法及其仿真分析[J].计算机学报,2005,28(10):1614-1619. 被引量:43
  • 3龙振洲.医学免疫学[M].北京:人民卫生出版社,1995..
  • 4Forrest S, Perelson A S, Rcherukuri A L. Self_nonself discrimination [C]//Proceeding of IEEE Symposium on Research in Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1994:201.
  • 5Aickelin U, Cayzer S. The danger theory and its application to artificial immune system [ C ]//Proceedings of the 1 st International Conference on Artificial Immune System ( ICARIS-2002 ), Canterbury, UK, 2002 : 141.
  • 6Matzinger P. The danger model : a renewed sense of self[ J ]. Science, 2002,296(12) :301.
  • 7Hart E, Ross P. Improving SOSDM : inspirations from the danger theory [ C]//Proc of the Second lnt Conf on AIS. Berlin: Springer-Verlag, 2003 : 194.
  • 8Kleinstein S H, Seiden P E. Simulating the immune system computing[ J]. Science and Engineering,2000,2(4 ) :69.
  • 9Reensmith J, Aickelin U, Twycross J. Detecting danger:applying a novel immunological concept to intrusion detection systems [ C ]//6th International Conference in Adaptive Computing in Design and Manufacture, Bristol, UK ,2004.
  • 10Hettich S, Bay S D. KDD Cup 1999 Data [ EB/OL]. (1999). http://kedd.ics. uci. edu.

共引文献111

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部