期刊文献+

“免疫软件人”的概念及其迁移机制 被引量:1

The Concept and Migrating Mechanism of Immune-SoftMan
原文传递
导出
摘要 "免疫软件人"(Immune-SoftMan,ISM)是以人工智能、人工生命、生物免疫机理和分布式系统为理论基础,结合智能机器人、智能网络和多智能体(Multi-agent)技术而提出的一个新概念。文章对"免疫软件人"的概念、主要特性和科学基础等进行了阐述,在此基础上提出了"免疫软件人"的迁移机制,并对"免疫软件人"的迁移方式和迁移过程以及在迁移过程中必须遵循的原则进行了深入细致的分析和讨论,这为进一步将"免疫软件人"技术应用到大规模、分布式入侵检测与防御系统开辟了新的研究思路。 Immune-SoftMan (ISM) is a new concept based on production of artificial intelligence,artificial life,biological immune mechanism and distributed technique. Immune-SoftMan is the development of mobile Agent and virtual Robot in network environment. It inherited many research fruits of Robot and Agent. In the paper,the concept and main characteristics of immune-SoftMan are depicted. On this base,we produce and present the migrating mechanism of immune-SoftMan,and construct its migrating model. Immune-SoftMan's corresponding theory and technology fruits provide a good foundation and reference for studying the present distributed intrusion detection and defence system.
出处 《阴山学刊(自然科学版)》 2009年第4期22-25,共4页 Yinshan Academic Journal(Natural Science Edition)
关键词 免疫软件人 生物免疫系统 迁移机制 人工智能 AGENT Immune-SoftMan Biological immune system Migrating mechanism Artificial intelligence Agent
  • 相关文献

参考文献11

  • 1马占飞,郑雪峰,曾广平,涂序彦.Multi-SoftMan入侵防御系统模型的智能弹性架构[J].计算机科学,2008,35(6):46-49. 被引量:6
  • 2Mark Sims,Daniel Corkill,Victor Lesser.Automated organization design for multi-agent systems[J]. Autonomous Agents and Multi - Agent Systems . 2008 (2) 被引量:1
  • 3Pieter Buzing,Adriaan ter Mors,Jeroen Valk,Cees Witteveen.Coordinating Self-interested Planning Agents[J]. Autonomous Agents and Multi - Agent Systems . 2006 (2) 被引量:1
  • 4Javier Vázquez-Salceda,Virginia Dignum,Frank Dignum.Organizing Multiagent Systems[J]. Autonomous Agents and Multi - Agent Systems . 2005 (3) 被引量:1
  • 5Zhanfei Ma,,Xuefeng Zheng.A Novel Network Security De-fence Mechanism Based on Multi-SoftMan. Proc.of the2008ISECS International Colloquium on Computing,Communication,Control,and Management . 2008 被引量:1
  • 6Craaff A.J,Engelbrecht A.R.Optimized Coverage of Non-self with Evolved Lymphocytes in an Artificial Im-mune System. International Journal of Computational Intelligence Research . 2006 被引量:1
  • 7Pignatari G.C,Takeshita D,Parise C.B.et al.Carcino Embryonic Antigen(CEA)Mimicry by an Anti-idiotypic scFv Isolated from Anti-Id6.C4Hybridoma. Journal of Biotechnology . 2007 被引量:1
  • 8GONG Xun,LI Tao,LU Ji,et al.Immunity and Mobile Agent Based Intrusion Detection for Grid. Proc.of the9th Pacific Rim International Workshop on Multi-Agents,PRIMA‘2006 . 2006 被引量:1
  • 9Lu Qing-ling,Zeng Guang-ping,Zhang Wei,et al.SoftMan and Agent. Proceedings of the International Conference on Networking,Sensing and Control(ICNSC’2005) . 2005 被引量:1
  • 10Sims Mark,Corkill Daniel,Lesser Victor.Automated organization design for multi-agent systems. Autonomous Agents and Multi Agent Systems . 2008 被引量:1

二级参考文献11

  • 1曾广平 涂序彦.软件人[A]..中国人工智能学会第10届全国学术年会论文集[C].北京:北京邮电大学,2003.567-572. 被引量:6
  • 2Snapp S R, Brentano J, Dias G V,et al. DIDS (Distributed Intrusion Detection System)-Motivation, Architecture, and An Early Prototypeff Proc. of the 14^th National Computer Security Conf. Vol 10. Washington, 1991:167-176 被引量:1
  • 3White G B, Fisch E A, Pooch U W. Cooperating Security Managers: A Peer-based Intrusion Detection System. IEEE Network, 1996, 10(1):20-23 被引量:1
  • 4Asaka M, Taguehi A, Goto S. The Implementation of IDA: An Intrusion Detection Agent System//Proc. of the 11^th FIRST Conf. 1999. Brisbane, 1999 被引量:1
  • 5Tu X Y, Zeng G P, Tang T. HADS: Humanized Autonomous Decentralized Systems [A]//Proc. of the International Symposium on Autonomous Decentralized Systems (ISADS' 2005) [C]. 2005: 593-598 被引量:1
  • 6Lu Q L, Zeng G P, Tu X Y. SoftMan and Agent [A]//Proc. of the International Conference on Networking, Sensing and Control (ICNSC'2005) [C]. Tucson, AZ, USA,March 2005 被引量:1
  • 7Zaki M, Sobh T S. Attack Abstraction Using a Multiagent System for Intrusion Detection [J]. Journal of Intelligent & Fuzzy Systems, 2005,16 : 141-150 被引量:1
  • 8Dasgupta D, Gonzalez F, Yallapu K, et al. CIDS: An Agentbased Intrusion Detection System[J]. Computers & Security, 2005,24 : 387-398 被引量:1
  • 9Dasgupta D, Rodrigue.z J, Balaehandran S. Mining Security Events in a Distributed Agent Society [A]//Proc. of the Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, part of SPIE Defense and Security Symposium-2006[C].Orlando, Florida, April 2006 被引量:1
  • 10Azzedine B, Renato B M, Kathia R L, et al. An Agent-based and Biological Inspired Real-time Intrusion Detection and Security Model for Computer Network Operations [J]. Computer Communications, 2007,1 : 1-14 被引量:1

共引文献5

同被引文献49

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部