期刊文献+

基于危险模式的异常检测模型 被引量:2

An Anomaly Detection Model Based on Danger Theory
在线阅读 下载PDF
导出
摘要 阐述了危险模式的概况及运行机制,提出了一种基于危险模式的异常检测模型以及相关的算法。该模型通过分析实时系统调用序列中的危险信号,进而判断是否为入侵事件。实验结果表明,该方法具有较高的有效性和检测率。 The general situation and running mechanism of danger theory are presented in this paper.After that we present an anomaly detection model based on danger theory,describe an interrelated algorithm.The method detects abnormal behavior through analyzing danger signal in the system calls sequences. Experiments show that the method is feasible and effective.
出处 《微计算机信息》 北大核心 2006年第08X期81-83,共3页 Control & Automation
基金 国防预研基金资助项目(编号不公开)
关键词 危险模式 免疫系统 异常检测 Danger model,Immune system,Anomaly detection
  • 相关文献

参考文献11

  • 1Forrest S,Perelson A,Allen L, Cherukuri R.Self-non-self discrimination in a computer[C].Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. 1994,202-212.
  • 2P D' haeseleer, Forrest S.An Immunologicial Approach to Change Detection:Algorithm,Analysis and Implication [J].In Proc.of IEEE Symposium on Research in Security and Privacy,Oakland,CA. 1996.
  • 3Matzinger P.Tolerance,Danger and the Extended Family[J].Annual Review of Immunology. 1994,12:991-1045.
  • 4Matzinger P.The Danger Model in Its HistoricalContext[J].Scandinavian Journal of Immunology. 2001,54:4-9.
  • 5Tim R Mosmann,Alexandra M Livingstone. Dendritic cells:the immune information management experts [J]. Nature Immunology.2004,5(6):564-566.
  • 6Manfred, B. L.and Schuler, G.Immature,semi-mature, and fully mature dendritic cells: which signals induce tolerance or immunity[J|.Trends in Immunology. 2002,Vol.23, No.9,991-1045.
  • 7Matzinger P.The Danger Model: A Renewed Sense of Selt[J].Science 2002,296:301-305.
  • 8Forrest S, Hofmeyr S A.A Sense of Self for Unix Processes[C].In:Proceedings of 1996 IEEE Symposium on Coputer Security and Privacy. 1996,120-128.
  • 9王全德,李世超,李祥和.安全防护系统及其关键技术研究[J].微计算机信息,2005,21(06X):1-3. 被引量:4
  • 10Julie Greensmith, Uwe Aickelin, Steve Cayzer. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection [R]. Digital Media Systems Laboratory.HPL-2005-117. 2005-7.

二级参考文献1

  • 1David A Solomon,Mark E Russinovich. Inside Microsoft Windows 2000,Third edition. Microsoft Press,2000.

共引文献3

同被引文献10

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部