期刊文献+

基于免疫Agent的网络安全模型 被引量:6

Model of network security based on immune agents
下载PDF
导出
摘要 借鉴现代免疫学理论,是解决网络安全问题的新的有效途径。分析了生物的免疫应答机理,利用B细胞网络模型与Agent技术,设计了一个基于免疫Agent的网络安全模型。该模型由产生多样性抗体、识别自我和识别非我等过程实现,并且具有分布性、健壮性和自适应性等特点。 The theory of modern immunology provides a new effective way to study network security. The mechanisms of biological immune response are analyzed. Applying B-cells network model and agent technology, a model of network security based on immune agents is given. The model is realized by the procedure for producing diverse antibody and recognizing self and non-self, and it is distributed, robust and self-adaptive.
作者 苏成 殷兆麟
出处 《计算机工程与设计》 CSCD 2003年第2期30-32,共3页 Computer Engineering and Design
基金 东南大学国家教委计算机网络重点实验室项目基金资助(K93-9-2001-2)
关键词 网络安全模型 免疫学理论 AGENT 人工智能 人工免疫系统 计算机网络 immunology AIS antibody agent network security
  • 相关文献

参考文献5

二级参考文献8

  • 1Forrest S,et al. A Sence of Self for Unix Processes . [A] IEEE Symposium on Security and Privacy[C]. Oakland :California IEEE Computer Society,1996. 120~128
  • 2Forrest S, Hofmeyr S A, Somayaji A. Computer Immunology,Communications of the ACM, 1997,40(10): 88~96
  • 3Forrest S, et al. Self-nonself discrimination in a computer. In:Proc. of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamos, CA, IEEE Computer Society Press, 1994
  • 4Hofmeyr S A. A Immunological Model of Distributed Detectionand its Application to Computer Security: [PhD thesis]. Department of Computer Seiences, University of New Mexico, Albuquerque ,NM ,April 1999
  • 5Somayaji A et al. Principles of a Computer Immune System. In:Proc. of the Second New Security Paradigms Workshop, 1997
  • 6张旭,于士军.电动汽车制动能量回收系统设计[J].河北农机,2016,0(12):50-50. 被引量:2
  • 7刘新天,王昊,何耀,郑昕昕,曾国建.基于最优能量回收的再生制动控制策略[J].时代汽车,2018,0(3):51-52. 被引量:5
  • 8胡建国,龚春忠,张永,何浩.电动汽车制动能量回收技术研究[J].汽车实用技术,2019,45(2):10-12. 被引量:6

共引文献102

同被引文献36

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2李涛.基于免疫的网络安全风险检测[J].中国科学(E辑),2005,35(8):798-816. 被引量:40
  • 3李涛.基于免疫的网络监控模型[J].计算机学报,2006,29(9):1515-1522. 被引量:53
  • 4[1]Wooldridge M,Jennings N R.Intelligent agents: Theory and practice [J].The Knowledge Engineering Review,1995,(2): 115-152.
  • 5[2]Genesereth,Micheal R.Interoperability: An agent-based framework [J].AI Expert,1995,(3):34-39.
  • 6[3]Taylor R N,Medidovic N,Anderson K M,et al.A component and message-based architectural style for GUI software [J].IEEE Transaction on Software Engineering,1996,(6):390-406.
  • 7[4]Bass L,Clcmcnts P,Kazman R.Software architecture in practice [M].Addison Wcslcy Longman,1998.
  • 8[5]Shaw M,Garlan D.Software architecture: Perspectives on an emerging discipline [M].Englewood Cliffs,New York:Prentice Hall,1996.
  • 9CICHOCKI C , RUSINKIEWICZ M . Migrating Workflows [ A ] .DOGAC A, ed. Workflow Management Systems and Interoperability[C]. Berlin, Heidelberg:Springer Verlag, 1998. 339-355.
  • 10HOHL F. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts[ A]. Mobile Agents and Security[C].Springer Verlag, 1998, LNCS 1419. 92 - 113.

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部