期刊文献+

基于改进的动态克隆选择算法的入侵检测模型研究

Research of the Intrusion Detection Model Based on Extended Dynamic Clonal Selection
在线阅读 下载PDF
导出
摘要 针对目前入侵检测系统不能有效检测已知攻击的变种和未知攻击行为的缺陷,受免疫系统中动态克隆选择算法的启发,提出了一种基于改进的动态克隆选择算法的入侵检测模型.该模型可以适应连续改变的环境,动态地学习变化的“正常”模式以及预测新的“异常”模式.经实验证明,该模型在降低误报率的情况下,提高了检测率. Because intrusion detection systems couldn't detect the mutant of existing intrusion behavior and undefined intrusion behavior effectively, according to the Dynamic Clonal Selection algorithms in the biological immune system, this paper presents an intrusion detection model based on extended Dynamic Clonal Selection algorithms. This model can adapt to continuously changing environments, dynamically learning the fluid normal patterns and predict new anomaly patterns. Experiment results show that this model improves the detection rate and maintains a low false alarm rate.
出处 《哈尔滨理工大学学报》 CAS 2006年第1期82-85,89,共5页 Journal of Harbin University of Science and Technology
基金 哈尔滨市学科后备带头人基金项目[2003AFXXJ013] 黑龙江省教育厅科学技术研究项目[10541044]
关键词 入侵检测 动态克隆选择 自体 非自体 intrusion detection dynamic clonal selection self non-self
  • 相关文献

参考文献7

  • 1DOUGHERTY J,KOHAVI R,SAHAMI M.Supervised and Unsupervised Discretisation of Continuous Features[C].The Proceeding of 12th Int.Conference on Machine Learning,los Altos,CA,1995.194-202.
  • 2胡可云,陆玉昌,石纯一.概念格及其应用进展[J].清华大学学报(自然科学版),2000,40(9):77-81. 被引量:115
  • 3张凤斌,杨永田,江子扬.遗传算法在基于网络异常的入侵检测中的应用[J].电子学报,2004,32(5):875-877. 被引量:30
  • 4KIM J,BENTLEY.Towards an Artificial Immune System for Network Intrusion Detection:An Investigation of Dynamic Clonal Selection[C],The Proceeding of the Congress on Evolutionary Computation (CEC-2002),Honolulu,2002.1 015-1 020.
  • 5FORREST S,PERELSON A S,ALLEN L,CHERUKURI R.Self-nonself Discrimination in a Computer[A].In Proc.of the IEEE Symposium on Research in Security and Privacy[C].IEEE Computer Society Press,Los Alamitos,CA,1994.202-212.
  • 6KIM J,BENTLEY.A Model of Gene Library Evolution in the Dynamic Clonal Selection Algorithm[C].The Proceeding of the First International Conference on Artificial Immune Systems (ICARIS),Canterbury,2002.175-182.
  • 7GONZALES F,DASGUPTA D.Anomaly Detection Using Real-valued Negative Selection [J].Journal of Genetic Programming and Evolvable Machines,2003,4 (4):383-403.

二级参考文献11

  • 1Hu Keyun,Proceedings of PAKDD-99[C],1999年,109页
  • 2Hu Keyun,Proceedings of RSFDGr C99,1999年,443页
  • 3王志海,清华大学学报,1998年,38卷,增2期,14页
  • 4Ho T B,KDD:Techniques and Applications,1997年,49页
  • 5Ho T B,IEICE Trans Inf Syst,1995年,E78-D卷,5期,553页
  • 6E Eskin.Anomaly detection over noisy data using learned probability distributions[A].Proceedings of the 17th International Conference on Machine Learning[C].San Mateo,CA:Morgan Kaufmann,2000.255-262.
  • 7T Lane,C Brodley.Temporal sequence learning and data reduction for anomaly detection[J].ACM Trans Info System Security,1999,2:295-331.
  • 8T Lane,C E Brodley.Data reduction techniques for instancebased learning from human/computer interface data[A].Proceedings of the 17th International Conference on Machine Learning[C].San Mateo,CA:Morgan Kaufmann,2000.519-526.
  • 9D Dasgupta,F Gonzalez.An immunity-based technique to characterize intrusions in computer networks[J].IEEE Transactions on Evolutionary Computation,2002,3(6):281-291.
  • 10E Zitzler,L Thiele.Multi-objective evolutionary algorithms:comparative case study and the strength pareto approach[J].IEEE Trans of Evolutionary Computation,1999,3(4):257-271.

共引文献142

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部