期刊文献+

高速网络入侵防御系统中免疫算法的改进 被引量:1

Improve of Immune Algorithm in the Intrusion Prevension System of High-Speed Network
下载PDF
导出
摘要 将人工免疫原理与高速网络分流技术结合,提出了一种基于免疫原理的高速网络入侵防御算法.在对阴性选择算法改进基础上引入疫苗算子和选择算子,降低了系统二次免疫应答时间,增强了系统抗体库自我学习能力,进而改善了系统的实时性和高效性.在分析了高速网络分流技术和改进阴性选择算法的基础上,建立了基于免疫原理的高速网络入侵防御系统.仿真结果证明了该算法的有效性. A new method is proposed against the limited capacity in making real-time intrusion prevention efficiently for high-speed network,that is the intrusion prevension algorithm based on immune principle,combining of the artificial immune principle and data-distribution technology.In the research on negative selection algorithm,the vaccine operator and positive selection operator are introduced to the algorithm.Owing to the new algorithm,self-learning ability of antibody bank gets enhanced and the time needed for secondary response is reduced,so that the efficiency of system gets greatly improved.After the analysis of data-distribution technology and negative selection algorithm,the intrusion prevension system based on immune principle is established.Simulation results show the effectiveness of the algorithm.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第5期109-112,117,共5页 Microelectronics & Computer
基金 江苏省教育厅 江苏科技大学课题(2005DX006J)
关键词 入侵防御 人工免疫理论 疫苗算子 选择算子 intrusion prevention artificial immune theory vaccine operator selection operator
  • 相关文献

参考文献5

  • 1Xue Hua, Li Xueying, Chen Yu, et al. Research on the intrusion detection and its implementation through data streaming[J].Computer Applieations, 2004(1): 112-114.
  • 2高丹,彭新光.基于DET曲线的入侵检测评估方法[J].微电子学与计算机,2008,25(8):133-135. 被引量:4
  • 3Forrest S, Hofmeyr S, Somayjia A. Computer immunology[J]. Communications of the ACM, 1997, 40 (10): 88--96.
  • 4余燕芳,陆军.基于改进遗传算法的服务器端负载均衡算法[J].微电子学与计算机,2007,24(7):146-148. 被引量:6
  • 5Hammad M, Conor R. A less destructive, context--aware crossover operator for GP[M]. Berlin, Heidelberg: Springer--Verlag, 2006 : 36-48.

二级参考文献12

  • 1王霜,修保新,肖卫东.Web服务器集群的负载均衡算法研究[J].计算机工程与应用,2004,40(25):78-80. 被引量:46
  • 2王培发,唐海娜,李俊,陈静姝.Cache虚拟服务器集群中IP负载均衡技术研究[J].微电子学与计算机,2005,22(5):155-158. 被引量:2
  • 3陈晓梅.入侵检测产品的评价研究[J].微电子学与计算机,2005,22(9):74-76. 被引量:5
  • 4张维勇,张华忠,柳楠.基于遗传算法的服务器端负载均衡系统的设计[J].计算机工程,2005,31(20):121-123. 被引量:7
  • 5Wang H F,Wu K Y.Hybrid genetic algorithm for optimization problems with permutation property[J].Computers & Operations Research,2004,31 (14):2453-2471.
  • 6Martin A, Doddington G, Kamm T. The DET curve in assessment of detection task performance [ C ]// Rhodes Proceedings of Eurospeech 1997. Greece, 1997:1895 - 1898.
  • 7Ghosh A K, Schwartzbard A. A study in using neural networks for anomaly and misuse detection[C]//Proceedings of the 8th USENIX Security Symposium Washington D C. 1999:23 - 26.
  • 8The Institute for Systems research. IDSanalyzer[EB/OL]. [2007- 01 - 13 ]. http://www.isr. umd. edu/CSHCN/research/IDSanalyzer/files/data/.
  • 9Stolfo S, Fan W, Lee W. Cost - based modeling for fraud and intrusion detection: results from the JAM project [C]// Proceedings of DISCEX 2000. Los Alarnitos CA, 2000 : 44 - 56
  • 10Gaffney J E, Jr Ulvila J W. Evaluation of intrusion detectors: a decision theory approach[C]//USA Security and Privacy, 2001. Proceedings 2001 IEEE Symposium on. Oakland, CA, 2001:50-61.

共引文献8

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部