期刊文献+

基于免疫赦免的入侵检测方法研究

Research to Intrusion Detection way Based on Immune Privilege
下载PDF
导出
摘要 针对现有网络安全技术的缺陷,将生命医学中的免疫赦免原理引入到入侵检测领域,提出了入侵免疫赦免的概念,给出了入侵免疫赦免系统模型及其各个功能模块的形式化定义,并说明了构建该模型时所需要的技术与机制.重点研究了入侵免疫赦免系统的赦免机制及原理,并给出了一个与免疫机制协同工作的入侵赦免触发器(赦免植入Agent,IPAT). In view of the flaw existed in network security technology, introduced the principle of immune privilege in the domain of life-and-medicine to the intrusion detection, put forward the concept of intrusion immune privilege, proposed the model of intrusion immune privilege system and the formalized definition to each function module, and explained the technology and mechanism needed in the constructing to this model. Studied the intrusion immune privilege system with emphasis on the mechanism and principle, and posed one intrusion immune trigger (ATP) co-operated with the immunity mechanism.
出处 《青海师范大学学报(自然科学版)》 2013年第4期1-4,共4页 Journal of Qinghai Normal University(Natural Science Edition)
基金 国家自然科学基金资助项目(No.61065009)
关键词 入侵赦免 IPAT 免疫赦免 检测因子 intrusion immune immune privilege agent transplant immune privilege detection gene
  • 相关文献

参考文献12

  • 1Verissimo P, Neves N F,Correia M. Intrusion-tolerant architectures:concepts and design. Arehitecting dependable systems[J]. Lecture Notes in Computer Science, Springer Verlag, 2003,2677 : 3 - 36.
  • 2Mead N R, Ellison R J, Linger R C, et al. Survivable Network Analysis Method[C]//In:Intrusion Tolerant Systems Joint PI Meeting Presentation. Washington: IEEE Computer Society Press,2004.
  • 3杨奕.基于入侵诱骗技术的网络安全研究与实现[J].计算机应用研究,2004,21(3):230-232. 被引量:17
  • 4Dengguo Feng, Ji Xiang. Experiences on Intrusion Tolerance Distributed System Proceedings of the 29th Annual International Computer Software and Application Conference (COMPSAC'05) [C]. 2005 IEEE.
  • 5张鸿志,张玉清,李学干.可生存性及紧急算法特征分析[J].计算机工程与应用,2005,41(1):127-131. 被引量:2
  • 6孟宁,李志杰,彭广华.眼免疫赦免与免疫偏离[J].眼科新进展,2000,20(2):161-163. 被引量:4
  • 7Yingqian Zhang, Efrat Manisterski, Sarit Kraus, V. S. Subrahmanian, David Peleg. Computing the fault tolerance of multi-agent deploy- ment. Artificial Intelligence[J]. 2009(173) :437-465.
  • 8Agustin Orfila, Javier Carbo, Arturo Ribagorda. Autonomous decision on intrusion detection with trained BDI agents. Computer Com- munications[J]. 2008, (31) : 1803- 1813.
  • 9张鸿志,张玉清,李学干.网络可生存性研究进展[J].计算机工程,2005,31(20):3-5. 被引量:13
  • 10崔竞松,王丽娜,张焕国,傅建明.一种并行容侵系统研究模型———RC模型[J].计算机学报,2004,27(4):500-506. 被引量:31

二级参考文献42

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部