期刊文献+

一种受免疫原理启发的网络入侵行为监测方法 被引量:2

A Surveillance Method for Network Intrusion Behavior Inspired by Immunology
下载PDF
导出
摘要 提出了一种受免疫原理启发的网络入侵行为监测方法.受免疫机制的启发,抽取网络数据包的特征信息模拟抗原,采用检测器模拟免疫细胞,通过检测器的进化,识别网络入侵行为数据包,检测到网络入侵时,对未实施完成的网络入侵进行预警,并实时提取网络入侵行为信息作为证据进行安全保存,通过数学语言推导了网络入侵行为监测的全过程,为网络入侵行为监测提供了一种新途径. A surveillance method for the network intrusion behavior inspired by immunology was proposed.Inspired by the immune mechanism,the antigen was simulated by the signature of a network packet and the immune cell was simulated by a detector.The packets of the network intrusion behavior were recognized by detectors which evolved.When the network intrusion was detected,an alarm information was formed and a real-time evidence of the network intrusion behavior was obtained and saved safely.The monitoring process of network intrusion behavior was deduced with a math language.The proposed method provided a new method for the surveillance of the network intrusion behavior.
作者 张雁 刘才铭
出处 《宜宾学院学报》 2012年第12期64-67,共4页 Journal of Yibin University
基金 国家自然科学基金(61103249) 乐山师范学院科研项目(Z1113 Z1065) 人工智能四川省重点实验室开放基金(2011RYJ01)
关键词 人工免疫 网络入侵 监测 检测器 artificial immunity network intrusion surveillance detector
  • 相关文献

参考文献12

  • 1Denning D E.An int rusion detection model[J].IEEE Transaction on Software Engineering.1987,13(2):222-232.
  • 2焦李成,杜海峰.人工免疫系统进展与展望[J].电子学报,2003,31(10):1540-1548. 被引量:224
  • 3肖人彬,王磊.人工免疫系统:原理、模型、分析及展望[J].计算机学报,2002,25(12):1281-1293. 被引量:209
  • 4Forrest S,Perelson A S.Self-nonself discrimination in a computer[C]//IEEE Symposium on Security and Privacy,Oakland,CA,May 16-18,1994.202-213.
  • 5Forrest S,Hofmeyr S A.Somayaji A.Computer immunology[J].Communications of the ACM,1997,40(10):88-96.
  • 6Hofmeyr S A,Forrest S.Immunity by design:An artificial immune system[C]//Genetic Evolutionary Computation Conf,San Francisco,CA,1999:1289-1296.
  • 7Hofmeyr S A,Forrest S.Architecture for an Artificial Immune System[J].Evolutionary Computation,2000,8(4):443-473.
  • 8Kim J,Bentley P J.An evaluation of negative selection in an artificial immune system for network intrusion detection[C]//Proceedings of the Genetic and Evolutionary Computation Conference,2001.
  • 9Dasgupta D.An immunity-based technique to characterize intrusions in computer networks[J].IEEE Transactions on Evolutionary Computation,2002,6(3):281-291.
  • 10Kim J,Bentley P J.Towards an artificial immune system for network intrusion detection:an investigation of dynamic clonal selection[C].The Congress on Evolutionary Computation,2002:1015-1020.

二级参考文献117

  • 1邹维,唐勇,韦韬.计算机取证应用技术[J].网络安全技术与应用,2004(5):32-34. 被引量:5
  • 2戴汝为,王珏.关于智能系统的综合集成[J].科学通报,1993,38(14):1249-1256. 被引量:52
  • 3戴汝为,王珏.巨型智能系统的探讨[J].自动化学报,1993,19(6):645-655. 被引量:39
  • 4LI Tao.An immunity based network security risk estimation[J].Science in China(Series F),2005,48(5):557-578. 被引量:30
  • 5陆德源.现代免疫学[M].上海:上海科学技术出版社,1998.14-16.
  • 6学科交叉和技术应用专门小组(美).学科交叉和技术应用[R].北京:科学出版社,1994.43.
  • 7HanJiawei Kamber M 范明等译.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 8M N O Sadiku. Artificial Intelligence [ J ]. IEEE Potentials, 1989, 8(2) :35 - 39.
  • 9R J Patton, C J Lopez-Toribio, F J Uppal. Artificial intelligence approaches to fault diagnosis[ A]. IEE Colloquium on Condition Monitoring :Machinety, External Structures and Health (Ref. No. 1999/034)[ C]. London:The Institute of Electrical Eagineers, 1999.5/1 - 5/18.
  • 10R Orwig, H Chen, D Vogel, et al. A multi-agent view of strategic planning using group support systems and artificial intelligence [J]. Group Decision and Negotiation, 1997,6( 1 ) : 37 - 59.

共引文献406

同被引文献15

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部