期刊文献+

基于抗原/抗体多样性机制的入侵特征表述与识别 被引量:1

Expression and recognition of intrusion signature based on varieties of antigen & antibody
在线阅读 下载PDF
导出
摘要 在生物免疫系统中,通常是在自身免疫细胞数远远小于可能抗原的情况下,成功应对几乎所有抗原,这主要得益于抗体的多样性。论文分析了攻击特征组成上与抗原的相似性后,提出了"特征元素-特征因子-特征基-攻击特征"的多层次、多特征融合的特征表述方法;给出基于该方法的IDS特征提取与识别算法。该特征表述方法使检测器具有多样性,为检测器自适应进化奠定了基础。 In the biological immune system,immune cells usually succeed in dealing with nearly all antigens under the condition that its counts is far smaller than possible antigen oneself, this benefits from the variety of antibody mainly.This paper analyzes a similarity between attack characteristic and antigen,and then puts forward a new expression of signature with the multi-level & multi-characteristic fuzzy with characteristic element,characteristic factor,characteristic base and intrusion pattern.The paper also provides algorithms of drawing and discerning IDS signature based on this expression.The expression inspired by varieties of antigen or antibody makes the intrusion detectors have variety,and more importantly,establish the foundation that the detection evolves.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第25期92-95,共4页 Computer Engineering and Applications
基金 国家部委基础科研项目 江苏省高校自然科学研究指导计划(No.06KJD520152) 南通大学博士启动基金(No.03080107) 南通大学自然科学基金(No.05Z053)
关键词 生物免疫 抗原 抗体 多样性 特征表述 入侵检测 biological immunity antigen antibody variety expression of signature intrusion detection
  • 相关文献

参考文献8

  • 1Forrest S,Perelson A S,Allen L,et al.Self-nonself discrimination in a computer[C]//Proceedings of IEEE Symposium on Research in Security and Privacy,Oakland, 1994.
  • 2Williamson M M.Biologically inspired approaches to computer security[R].HPL-2002-131.
  • 3Somayaji A,Forrest S.Automated response using system-call delays [C]//Preceedings of the 9th USENIX Security Symposium, 2000:185-197.
  • 4Aickelin U,Cayzer S.The danger theory and its application to artificial immune systems[C]//Proceedings of The First International Conference on Artificial Immunt System (ICARIS 2002),Canterbury, UK,2002: 141-148.
  • 5Aickelin U,Greensmith J,Twycross J.Immunt system approaches to intrusion detection-a review [EB/OL].http://www.cs.nott.ac.uk/~uxa/ papers/04icaris_ids_review.pdf.
  • 6Hofmeyr S A,Forrest S.Architecture for an artificial immune system[J].Evolutionary Computation,2000,7( 1 ) :45-68.
  • 7Perelson A S,Oster G F.Theoretical studies of clonal selection: minimal antibody repertoire size and reliability of self-nonself discrimination[J].J Theor Biol, 1979(81 ) :645-670.
  • 8Tonegawa S.Somatic generation of antibody diversity[J].Nature, 1983 (302) :575-581.

同被引文献24

  • 1WILLIAMSON M M. Biologically inspired approaches to computer security[ R]. HPL-2002-131, HP Laboratories Bristol, 2002.
  • 2AICKELIN U, GREENSMITH J, TWYCROSS J. Immune system approaches to intrusion detection: a review [ C ]//Proc of the 3rd International Conference on Artificial Immune Systems. Catania: [ s. n. ] , 2004:316-329.
  • 3KEPHART J O, SORKIN G B,SWIMMER M. An immune system for cyberspace[ C ]//Proc of the 4th International Symposium on Autonomous Decentralized Systems, Aman and Cybernetics. Florida: Orlando, 1997:897- 884.
  • 4KIM J, BENTLEY P. Evaluating negative selection in an artificial immune system for network intrusion detection [ C ]//Proc of GECCO. 2001:1330-1337.
  • 5DASGUTPA D. Advances in artificial immune systems[ J ]. Computational Intelligence Magazine, IEEE,2006, 1 (4) :40-49.
  • 6LEDERBERG J. Genes and antribodies: do antigens bear instruction for antibody specificity or do they select cell lines that arise by mutation [ J ]. Science, 1959,129:1649-1653.
  • 7LANGMAN K E, COHN M. Self-nonself discriminateion revisited, Introduction [ J ]. Semin I mmunol, 2000,12:159-162
  • 8JANEWAY C J. Approaching the asymptote? Evolution and revolution in immuneology [ J ]. Cold Spring Harbour Symposium Ouant Biol, 1989,54:1-13.
  • 9MATZINGER P. The danger model:a renewed sense of self[J]. Science ,2002:296, 301-305.
  • 10MATZINGER. P. Tolerance danger and the extended family [ J ]. Annual Review of Immunology, 1994, 12:991-1045.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部