期刊文献+

试论基于免疫思想终端安全系统的设计思路 被引量:1

Terminal Based on the Immunity of Security System Design
下载PDF
导出
摘要 计算机技术突飞猛进使得计算机主机的拥有量呈级数级上升,并已应用到各行各业,甚至家庭。但是,由于操作系统等核心技术还依赖国外技术,因此我国的计算机和网络安全只能做到附加的安全。在此情况下,终端的安全就尤为重要,是信息安全的最后防线。本文提出了一种基于免疫思想的终端安全思路,试图从内涵上解决网络的安全问题,改变以往用杀毒软件和木马清除工具的那种不断扩大的外延方式,有望在附加安全的体制下,更加有效地解决信息安全问题。本文提出的设计理念和设计模型已经在实践中得到证实,并正在产品化过程中。 Computer technology advances have made the amount of the host computer series level was increased,and has been applied to all walks of life,even family.However,because the operating system and other core technology is also dependent on foreign technology,China's computer and network security can only be added security.In this case,the terminal's security is especially important to information security is the last line of defense.In this paper,the idea of a terminal based on immune security ideas,trying to solve the content problem of network security,antivirus software and change the past with the kind of removal tool Muma growing epitaxial way the system is expected to add all the more secure effectively address information security issues.The proposed design concept and design models have been confirmed in practice,and is product of the process.
出处 《信息安全与技术》 2011年第1期14-17,共4页
关键词 免疫思想 信息安全 终端安全 Immunity Thought Network Safety Terminal Safety
  • 相关文献

参考文献10

二级参考文献83

  • 1KimJ Bentley P.The artificial immune model for network intrusion detection[A]..7th European Conference on Intelligent Techniques and Soft Computing (EUFIT′99)[C].,1999.13~19.
  • 2[英]PM利迪亚德 A惠兰 M W范杰.林慰慈 薛彬 魏雪涛译.免疫学[M].北京:科学出版社,2001..
  • 3[2]Steven A.Hofmeyr,S.Forrest Architecture for an Artificial Immune System,Evaluationary Computation, Vol.7, No. 1,45 ~ 51.
  • 4[3]Stefan Axelsson Research in Intrusion Detection Systems:Part 1-Basic Theory and Applications.
  • 5D' haesdeer. An immunological approach to change detection: Theoretical results. In: The 9th IEEE Computer Security Foundations Workshop. Los Alamitos, CA: IEEE Computer Society Press, 1996.
  • 6Dasgupta. An immune agent architecture for intrusion detection.GECCO 2000, Las Vegas, Nevada, USA, 2000.
  • 7Dasgupta. Immunity-based intrusion detection systems: A general framework. The 22nd National Information Systems Security Conf(NISSC), 1999. ftp://ftp, msci. memphis, edu/comp/dasgupta/papers/Immune-IDS, pdf.
  • 8Dasgupta, Gonzalez. An immunogenetic approach to intrusion detection. The University of Memphis, Tech Rep: CS-01-001,2001.
  • 9Dasgupta, Nino. A comparison of negative and positive selection algorithms in novel pattern detection. The IEEE Int'1 Conf on Systems, Man and Cybernetics (SMC), Nashville, 2000.
  • 10Kim, Bentley. The artificial immune model for network intrusion detection.The 7th EUFIT' 99, Aachen, Germany, 1999.http://www. es. ucl. ac. uk/staff/J. Kim/pub/EUFITaimmune. ps.

共引文献65

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部