期刊文献+

人工免疫原理在NIDS中的研究

Studies in Network-based IDS Based on Artificial Immune Theory
下载PDF
导出
摘要 分析了人工免疫系统的原理,简单建立了一种基于否定选择算法的网络入侵检测系统,引入了一种用于异常事件识别的r-字符块匹配规则,并对规则存在的漏洞进行了分析。 The paper gives a brief introduction to the principle of immune System. In particular, the paper gives a simple NIDS model based on negative selection algorithm, introduces a new string matching rule, r - chunks, for detecting anomalous events and analyzes the "hole" induced by the rule.
作者 胡坤华
出处 《宜春学院学报》 2006年第2期56-58,共3页 Journal of Yichun University
关键词 入侵检测 人工免疫原理 匹配规则 否定选择算法 Intrusion Detection Immune System Matching Rule Negative Selection Algorithm
  • 相关文献

参考文献4

  • 1陈鹏,吕卫锋,单征.基于网络的入侵检测方法研究[J].计算机工程与应用,2001,37(19):44-48. 被引量:35
  • 2Dasgupta D.Immunity-based Intrusion Detection System:A General Framework.In Proc.of the 22nd N1SSC,1999. 被引量:1
  • 3Forrest,S A Parelson,L Allen et al.Self-nonself Discrimination in a Computer[C].Proceeding of the 1994IEEE Sysposium on Research in Security and Privacy,Los Alamos,CA,IEEE Computer Society Press,1994. 被引量:1
  • 4J Bahhrop,et al.Glickman.Coverage and Generalization in an Artificial Immune System (AAAA)[C].Proceedings of the International Conference Genetic and Evolutionary Computation(GECCO-2002).New York,2002. 被引量:1

二级参考文献13

  • 1[1]D E Denning. An Intrusion-Detection Model[J].IEEE Transactions on Software Engineering, 1987;SE-13(2) :222-2 被引量:1
  • 2[2]G Vigna,R A Kemmerer. NetSTAT:A Network-based Intrusion Detection Approach[C].Proceedings of the 14th Annual Computer Security Conference,Scottsdale,Arizona, 1998.12 被引量:1
  • 3[3]S Kumar. Classification and Detection of Computer Intrusions[D].PhD Dissertation. Department of Computer Sciences,PurdueUniversity,1995 被引量:1
  • 4[4]J Balasubramaniyan,J Omar Garcia-Fernandez,D Isacoff et al.An Architecture for Intrusion Detection using Autonomous Agents[R].Department of Computer Sciences,Purdue University,Coast TR 98-05,1998 被引量:1
  • 5[5]Frincke D,Don Tobin,Jesse McConnell et al.A Framework for Cooperative Intrusion Detection[C].Proceedings of the 21 st National Information Systems Security Conference,1998.10:361-373 被引量:1
  • 6[6]W Lee,S J Stolfo,K Mok. A Data Mining Framework for Building Intrusion Detection Models[C].Proceedings of the IEEE Symposium on Security and Privacy, 1999 被引量:1
  • 7[7]Guy Helmer,Johnny S K Wong,Vasant Honavar et al.Intelligent Agents for Intrusion Detection[C].Proceedings,IEEE Information Technology Conference, Syracuse, NY, 1998.9:121-124 被引量:1
  • 8[8]M Conner,C Patel,M Little. Genetic Algorithm/Artificial Life Evolution of Security Vulnerability Agents[C].Army Research Laboratory Federal Laboratory 3rd Annual Symposium on Advanced Telecommunications & Information Distribution Research Program(ATIRP),1999.2 被引量:1
  • 9[9]Jacobs S,D Dumas,W Booth et al.Security Architecture for Intelligent Agent Based Vulnerability Analysis[C].Proceedings:3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution Research Program, College Park, MD.37,1999.2: 447-451 被引量:1
  • 10[10]Barrett Michael,W Booth,M Conner et al. Intelligent Agents System Requirements and Architecture[R].Report to ATIRP,1998.10 被引量:1

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部