期刊文献+

基于免疫学理论的入侵检测技术 被引量:3

Immunology-based Intrusion Detection Technology
下载PDF
导出
摘要 计算机安全的多数问题都可以归结为对自我(合法用户、授权的行动等)和非我(入侵者、计算机病毒等)的识别,而生物免疫系统千百万年来一直在努力解决这一问题。基于免疫学理论的入侵检测技术正是受到生物免疫学的启发而提出的。文章介绍了基于免疫学理论的入侵检测技术的理论、算法,分析了它的优缺点并提出了进一步研究的方向。 Much of computer security can be viewed as the problem of distinguishing self(legitimate users,authorized actions,etc.)from nonself(intruders,computer viruses,etc).However,the natural immune system has been solving a similar problem for hundreds of millions of years.Immunology-based intrusion detection technology has motivated from immunol-ogy.This paper introduces its theories and algorithms ,analyses its advantages and disadvantages and presents the future researches.
出处 《计算机工程与应用》 CSCD 北大核心 2002年第22期173-176,共4页 Computer Engineering and Applications
关键词 免疫学理论 入侵检测 网络安全 计算机安全 计算机网络 network security,computer security,intrusion detection,immunology
  • 相关文献

参考文献6

  • 1S Forrest,A S Perelson,L Allen et al.Self-nonself discrimination ina computer[C].In :Proceedings of the 1994 IEEE Symposium on Re-search in Security and Privacy,Los Alamitos,CA :IEEE ComputerSociety Press, 1994
  • 2D'haeseleer Patrik,Forrest Stephanie,Helman Paul. A Distributed Ap-proach to Anomaly Detection [online].University of New Mexico,Available WWW:〈URL:http://www.cs.unm.edu/~forrest/papers.html,1997
  • 3Wespi A,Dacier M,Debar H(IBM Zurich).Intrusion Detection UsingVariable-Length Audit Trail Patterns(RZ 3164).Zurich,Switzerland:IBM Research. Available WWW:〈URL:http://domino.watson.ibm.com/library/C YBERDIG.NSF/95f0a8c5802d9417852566a90057461 f/02a4ec9dSb79ae 14852567da0034838f/3F1LE/rz3164.ps〉, 1999
  • 4P Helman,S Forrest. An efficient algorithm for generating random an-tibody strings[R].Technical Report CS-94-07,The University of NewMexico, Albuquerque, NM, 1994
  • 5P D'haeseleer. Further efficient algorithms for generating antibodystrings[R].Technical Report CS95-3,The University of New Mexico,Albuquerque, NM, 1995
  • 6J Allen,A Christie,W Fithen et al.State of the practice of intrusiondetection technologies[R].Carnegie Mellon University/Software Engi-neering Institute Technical Report CMU/SEI-99-TR-028,2000-01

同被引文献10

  • 1戚湧,张琨,刘凤玉,衷宜.基于生物免疫学的分布式入侵检测系统模型[J].计算机工程与设计,2004,25(4):481-483. 被引量:7
  • 2孙啸.生物信息学[EB/OL].东南大学.http://www.lmbe.seu.edu.cn/chenyuan/xsun/bioinfomatics/Web/CharpterThree/3.1.htm
  • 3Hofmeyr S A,Forrest S.Architecture for an artificial immune system[J].Evolutionary Computation,2000,8(4):443-473.
  • 4Hofmeyr S A.An immunological model of distributed detection and its application to computer security[D].Albuquerque,NM:The University of New Mexico,1999.
  • 5Dasgupta D,Gonzalz F.An immunity-based technique to characterize intrusions in computer networks[J].IEEE Transactions on Evolutionary Computation,2002,6(3):281-291.
  • 6Jungwon k,Bentley P J.Toward an artificial immune system for network intrusion detection:an investigation of dynamic clonal selection[C].Piscataway:Proceedings of the congress on Evolutionary Computation,2002.1015-1020.
  • 7Stephanie Forrest, ALan PereLson. Self-NonSelf Discrimination in a Computer[ C]. Proceeding of 1994 IEEE Symposium on Research in Security and Privacy. Los ALamos, CA:IEEE Computer Society Press. 1994:202-212,221-231.
  • 8Kim J, Bentley P. The artificial immune model for network intrusion detection [ C ]. In:Proc 7th European Congress on Intelligent Techniques and Soft Computing, Aaehen,Germany, 1999:13-19.
  • 9Kim J, Bentley P. Towards an artificial immune system for network intrusion detection:An investigation of clonal selection with a negative selection operator [ C ]. In : Proc Congress on Evolutionary Computation, Seoul, Korea, 2001.
  • 10王胜和.基于数据挖掘的入侵检测系统设计[J].计算机工程与设计,2004,25(2):243-245. 被引量:8

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部