期刊文献+

基于人工免疫系统的入侵检测研究 被引量:1

Research on Intrusion Detection Based on Artificial Immune System
下载PDF
导出
摘要 人工免疫系统(AIS)作为解决入侵检测问题的一种方法,已经显示其突出的优点并得到快速发展。为使入侵检测系统的研究者更进一步了解基于AIS的入侵检测研究进展,回顾基于第1代和第2代AIS的入侵检测常用算法,并指出算法特点。阐述树突细胞算法(DCA)适合于解决入侵检测问题的优势,给出针对DCA算法的未来研究工作,包括该算法的形式化描述、通过分片思想实现DCA在线分析组件以及DCA输入数据的自动数据预处理。 As one of the solutions to intrusion detection problem, Artificial Immune System(AIS) shows their advantages, and develops rapidly. The aim of this paper is to further know the recent advances in AIS-based intrusion detection for Intrusion Detection System(IDS) practitioners. Some of the commonly intrusion detection problem used the first and the second generation AIS paradigms are reviewed and the characteristics of each particular algorithm are demonstrated. It is shown that the Dendritic Cells Algorithm(DCA) is demonstrated the potential as a suitable candidate for intrusion detection problems. Consequently, the future works for DCA are proposed, including the formal description for the algorithm, an online analysis component to DCA based on segmentation and the automated data preprocessing for DCA input data.
出处 《计算机工程》 CAS CSCD 2013年第11期136-138,142,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61240023)
关键词 人工免疫系统 入侵检测 负选择算法 克隆选择算法 独特型免疫网络 树突细胞算法 Artificial Immune System(AIS) intrusion detection negative selection algorithm clonal selection algorithm idiotypicimmune network Dendritic Cells Algorithm(DCA)
  • 相关文献

参考文献23

  • 1de Castro L N, Timmis J. Artificial Immune Systems: A New Computational Intelligence Approach[M]. London, UK: Springer-Verlag, 2002.
  • 2LI Tao.An immunity based network security risk estimation[J].Science in China(Series F),2005,48(5):557-578. 被引量:30
  • 3LI Tao.An immune based dynamic intrusion detection model[J].Chinese Science Bulletin,2005,50(22):2650-2657. 被引量:17
  • 4He Yang, Liang Yiwen, Li Tao, et al. A Method Inspired from Differential Coefficient for Calculating Danger Signals in Artificial Immune System[C]//Proc. of PACIIA’09. Wuhan, China: [s. n.], 2009.
  • 5Stibor T. On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection[D]. Darmstadt, Germany: Darmstadt University of Technology, 2006.
  • 6Greensmith J, Twycross U A J. Articulation and Clarification of the Dendritic Cell Algorithm[C]//Proc. of ICARIS’06. Oeiras, Portugal: [s. n.], 2006.
  • 7Matzinger P. Tolerance, Danger, and the Extended Family[J]. Annual Review of Immunology, 1994, 12(1): 991-1045.
  • 8Sarafijanovic S, le Boudec J. An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad-hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors[J]. International Journal of Unconventional Computing, 2005, 1(2): 221-254.
  • 9Gonzales L J, Cannady J. A Self-adaptive Negative Selection Approach for Anomaly Detection[C]//Proc. of CEC’04. San Diego, USA: IEEE Press, 2004.
  • 10Hang Xiaoshu, Dai Honghua. Constructing Detectors in Schema Complementary Space for Anomaly Detection[C]// Proc. of GECCO’04. Berlin, Germany: Springer-Verlag, 2004.

二级参考文献34

  • 1闫巧,江勇,吴建平.基于免疫机理的网络入侵检测系统的抗体生成与检测组件[J].计算机学报,2005,28(10):1601-1607. 被引量:18
  • 2LI Tao.An immunity based network security risk estimation[J].Science in China(Series F),2005,48(5):557-578. 被引量:30
  • 3Matzinger P.Friendly and dangerous signals:is the tissue in control?[J].Nature Immunology,2007,8(1):11-13.
  • 4Greensmith J.The dendritic cell algorithm[D].PhD thesis,School of Computer Science,University Of Nottingham,2007.
  • 5Jitendra R R.Multi-sensor data fusion with matlab[M].New York:CRC Press,2009.
  • 6Symantec Corporation. Internet security threat report volume XIV [EB/OL].(2009-04-30) [2010-04-22].http:// www. symantec, corn/business/theme, jsp? themeid = threat-report.
  • 7Symantec Corporation. Symantec intelligence quarterly, October-December 2009 reports [ EB/OL]. (2010-01-30) [2010-04-22]. http://www, symantec, corn/business/ theme, jsp? themeid = threatreport.
  • 8Parampalli C, Sekar R ,Johnson R. A practical mimicry attack against powerful system-call monitors [ C ] //Proceedings of ACM Symposium on Computer and Communications Security. Tokyo : ACM ,2008 : 156-167.
  • 9Wagner D, Soto P. Mimicry attacks on host-based intrusion detection systems [C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington D C : ACM ,2002:255-264.
  • 10Oberheide J. Detecting and evading CWSandbox[ EB/OL]. (2008-01-15) [2010-04-22]. http://ion, obe-rheide, org/ blog/2008/01/15/detecting-and-evading-cwsandbox/.

共引文献50

同被引文献17

  • 1Gungor V C; Lu B, Hancke G P. Opportunities and challenges of wireless sensor networks in smart grid[J]. IEEE Transactions on Industrial Electronics, 2010, 57(10): 3557-3564.
  • 2Arnold J N, Wormald M R, Sim R B, et al. The impact of glycosylation on the biological functionand structure of human immunogiobulins[J]. Annu. Rev. Immunol., 2007, 25: 21-50.
  • 3Kuang L, Zulkernine M. An anomaly intrusion detection method using the csi-knn algorithm[C]. Proceedings of the 2008 ACM symposium on Applied computing. ACM, 2008: 921-926.
  • 4冯莹莹,余世干,刘辉.KNN-IPSO选择特征的网络入侵检测[J].
  • 5Wang C, Feng T, Kim Let al. Catching packet droppers and modifiers in wireless sensor networks[C]. The 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, 2009:1-9.
  • 6Sun T, Liu X. Agent-based intrusion detection and self-recovery system for wireless sensor networks[C]. The 5th IEEE International Conference on Broadband Network & Multimedia Technology (IC-BNMT). IEEE, 2013: 206-210.
  • 7Sedjelmaci H, Senouci S M. Efficient and lightweight inmision detection based on nodes' behaviors in wireless sensor networks[C]. Global Information Infi'astzucture Symposium, 2013. IEEE, 2013: 1-6.
  • 8Matzinger P. Tolerance, clanger, and the extended family[J]. Annual review of intrnunology, 1994, 12(1): 991-1045.
  • 9Mohsin M F M, Bakar A A, Hamdan A R. Outbreak detection model based on danger theory[J]. Applied Soft Computing, 2014, 24: 612-622.
  • 10Lo N W, Yohan A. Danger theory-based privacy protection model for Social Networks[C]. 2014 Federated Conference on Computer Science and Information Systems (FedCSIS).IEEE, 2014: 1397-1406.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部