期刊文献+

基于免疫Agent的网络入侵检测模型

Based on Immune Agent Network Intrusion Detection Model
在线阅读 下载PDF
导出
摘要 入侵检测作为一种主动的信息安全保障措施,已成为计算机安全特别是网络安全领域的研究热点。基于免疫Agent的网络入侵检测模型是应用生物免疫代理原理构建,该模型具有很好的可扩充性,模型采用没有控制中心的并行ImA检测模式,且各自独立、相互协作并合作完成检测任务。与其它网络入侵检测模型相比,具有较强的伸缩性、自治性、健壮性和可扩展性等。 Intrusion detection is a proactive network security protection mechanism,which has become a research focus in the field of the network security. Based on Immune Agent Network Intrusion Detection Model is the application of biological principles to build the immune agents, the model has good scalability, model no control center using the parallel ImA detection mode, and independent, mutual collaboration and cooperation in the completion of inspection tasks. With other network intrusion detection model, compared with strong flexibility, autonomy, robustness and scalability and so on.
出处 《电脑与信息技术》 2010年第1期46-48,共3页 Computer and Information Technology
关键词 入侵检测 免疫代理 检测元 Intrusion detection immune Agent detector
  • 相关文献

参考文献12

  • 1Denning D E. An Intrusion Detection, Mode 1[J]. IEEE Transactions on Software Engineering, 1987,13 (2): 222-232.
  • 2Rao, A., Georgeff, M..Modeling rational agents within a BDI-architecture [C]. In Proceedings of Knowledge Representation and Reasoning, (1991) 473-484.
  • 3张相锋,孙玉芳.入侵检测系统发展的研究综述[J].计算机科学,2003,30(8):45-49. 被引量:17
  • 4何险峰,黄迪明,黄羽,刘家芬.基于Agent的入侵检测系统体系结构设计[J].计算机应用,2003,23(9):42-44. 被引量:3
  • 5Shoham Y..Agent Oriented Programming[J], Artificial Intelligence, 1993, 60(1) :51-92.
  • 6Wayne Jansen, Peter Mell, Tom Karygiannis, Don Marks..Applying Mobile Agents tolntrusion Detectian and Response [J]. Nationalinstitute ofstandards and technologycomputer securitydivision, October 1999:10-16.
  • 7M Kaiser, R DiUmann,H Friedrieh,etal. Learning coordination skills in multi-agent system[A]. IEEE/RSJ Int Conf on lntell Robots & Syst[C]. Osaka,1996, 3:1488-1495.
  • 8陈慰峰.医学免疫学(第3版)[M].北京:人民卫生出版社,2001.
  • 9周建国.网络入侵检测的免疫学建模及其仿真研究[M].北京航空航天大学出版社,2002.
  • 10闫巧,谢维信.免疫思想在计算机安全系统中的应用[J].计算机科学,2002,29(2):98-99. 被引量:6

二级参考文献33

  • 1..http://www. ietf. org/html. charters/idwg-charter. html,Apri14,2002.
  • 2Chittur A. Model Generation for an Intrusion Detection System Using Genetic Algorithms[D]. Ossining High School, Ossining, NY, Nov27, 2001.
  • 3Stolfo SJ, Lee W, Chan PK, et al. Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project[D]. Columbia University, Georgia Institute of Technology and Florida Institute of Technology, Sept 9, 2001.
  • 4Asaka M, Onabula T, Nakasuka S. Intrusion Detection and Intrusion Route Tracing by Use of Mobile Agents[Z]. Intelligent Agent Technology, 2000.
  • 5Hofmeyr SA, Forrest S, Somayaji A. Lightweight Intrusion Detection for Networked Operation Systems[J]. Journal of Computer Security,1997,5(2).
  • 6Anderson J P. Computer security threat monitoring and surveillance: [Technical report]. James P. Anderson Company, FortWashington,Pennsylvania,April 1980.
  • 7Staniford-Chen S, Cheung S, Crawford R, et al. GRIDS - A Graph Based Intrusion Detection System for Large Networks. In: 20^th National Information System Security Conf (NISSC) ,Oct. 1996.
  • 8Cheung, Steven, Crawford R, et al. The Design of GRIDS: A Graph-Based Intrusion Detection System: [Technical report CSE-99-02]. The University of California, Davis Department of Computer Science. Jan. 1999.
  • 9Denning D E. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13 (2) : 222 - 232.
  • 10CSC-STD-001-83, Department of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DoD Computer Security Center,Aug 1983.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部