期刊文献+

免疫原理在容侵系统中的应用 被引量:2

Application of Immunity Principle in Intrusion Tolerance System
在线阅读 下载PDF
导出
摘要 容侵系统是一种全新的网络安全技术。为了很好的实现容侵系统的分布式、智能化和全面安全的要求在分析生物体免疫系统与容侵系统相似性的基础上,提出将生物免疫系统的原理应用到容侵系统的研究中,并对识别“自我/非我”、“否定选择”、免疫网络算法在容侵中的应用提供了具体的方法。实践表明,根据此原理能够判断出合法用户与非法用户,可以防止内部节点攻击正常连接的节点,也能够根据计算出的个体细胞的受激程度来更新网络的结构和参数,在容侵系统中实现系统的重构。为容侵系统的实现提供了一种可行的方法。 Intrusion tolerance system is a new kind of fire network security technique. In order to implement the distributed, intelligent and complete secure requirement in intrusion tolerance system, this paper presents the intrusion tolerance system with the principle of immune system on the basis of analyzing the comparability between immune system and intrusion tolerance system, and also proposes the application of "self/non -self","negative seleticon"and an immune network algorithm in intrusion tolerance system. The legal user and illegal user can be jedged in practice, which can prevent the interior node from attacking the node connected normally and can update the network configuration and parameters on the basis of calculated stimulated degree of cellular, implementing the system reconfiguration in intrusion tolerance system. This paper provides a kind of feasible way for implementing intrusion tolerance system.
出处 《电脑开发与应用》 2006年第4期4-6,共3页 Computer Development & Applications
基金 山西省2004年工业攻关计划项目(编号:041009) 太原高新区2003年科技攻关计划项目(编号:200324A)
关键词 容侵 免疫原理 网络安全 intrusion tolerance, immunity principle, network seeurity
  • 相关文献

参考文献8

  • 1鲁云平,陈蜀宇,姚雪梅.免疫原理在入侵检测技术中的研究[J].计算机应用研究,2004,21(3):228-229. 被引量:7
  • 2Forrest S,Hofmeyr S A,Somayaji A.Computer Immunology[J].Communication of the ACM,1997,40(10):88-96.
  • 3Steven Andrew Hofmeyr.An Immulogical Model of Distributed Detection and Its Application to Computer Security[D].Phd Thesis:University of New Mexico,1999.
  • 4Jungwon Kim,Peter Bentley.The Human Immune System and Network Intrusion Detection[C].EUFIT99,Aachen,Germany,1999.
  • 5Forrest,S A Parelson,L Allen et al.Self-nonself Discrimination in a Computer[C].http://www.cs.unm.edu/-immsec/publications/virus.pdf,2005-08-11.
  • 6S T Wierzchon.Discriminative Power of the Receptors Activated by K-contiguous Bits Rule[J].Journal of Computer Science and Technology.2000,1(3):1-13.
  • 7J Balthrop.Glickman.Coverage and Generalization in an Artificial Immune System[C].http://www.cs.unm.edu/-judd/papers/generalization.pdf,2005-06-16.
  • 8吴敏毓 刘恭植.医学免疫学[M].合肥:中国科学技术大学出版社,1999..

二级参考文献1

  • 1吴敏毓 刘恭植.医学免疫学[M].合肥:中国科学技术大学出版社,1999..

共引文献12

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部