期刊文献+

基于危险理论的网络入侵检测系统研究 被引量:13

Research on Network Intrusion Detection System Based on Danger Theory
在线阅读 下载PDF
导出
摘要 由于现在网络攻击的复杂性和多样性,迫使网络入侵检测系统产品需要从一个简单机械的产品发展成为智能化的产品。基于人工免疫理论的入侵检测系统是一种根据自然免疫原理法则、具有智能的入侵检测系统。首先介绍入侵检测系统的发展情况,并针对当前入侵技术在检测入侵的不足,系统地介绍了生物免疫系统的组成、功能,以及免疫系统的两大理论自我/非我理论和危险理论的内容。从而根据免疫空间模型,提出了一种基于危险理论的免疫系统模型及算法,将其应用到网络入侵系统中,最后基于KDD—CUP99数据库的实验验证了系统的有效性。 Due to the complexity and variety of the network attack, the performance of Intrusion Detection System (IDS) has to beupgraded from a simple machine product to an intellectualized product. The IDS based on artificial immune theory is an intelligent intrusion detection system originated from natural immune theory. The article firstly introduces the development of IDS and the insufficiencies of the current intrusion technology in detecting intrusion, then gives a systematic overview of natural immune system's composition, function, and two major theories Self/Non - Self (SNS) and Danger Theory (DT) in the immune system. Therefore, based on immune space model, it puts forward an immune system model and the algorithm based upon DT, and applies it to the network intrusion system. Finally, the system's validity is demoustrated by the experimental resalts with KDD--CUP99 database.
作者 王慧
出处 《计算机仿真》 CSCD 北大核心 2010年第6期159-162,190,共5页 Computer Simulation
关键词 网络安全 入侵检测 人工免疫 危险理论 自我/非我理论 Network security Intrusion detection Artificial immune Danger theory Self/non - self theory
  • 相关文献

参考文献5

  • 1许春,李涛,刘孙俊,赵辉,张建华,刘念.基于免疫危险理论的新型网络入侵检测方法研究[J].南京邮电大学学报(自然科学版),2006,26(5):80-85. 被引量:17
  • 2F M Bumet. The clonal selection theory of acquired immunity [ M ]. Cambridge:Vanderbilt University Press, 1959.
  • 3Matzinger Pony. The danger model: a renewed sense of self[ J]. SCIENCE, 2002,296:301 - 305.
  • 4J Kim, P J Bentley. Evaluating Negative Selection in an Artificial Immune System for Network Intrusion Conference [ C ]. Genetic and Evolu - tionary Computation Conference, San Francisco, 2001. 1330 - 1337.
  • 5胡军华,周炎涛,郭如冰.一种基于网络的入侵检测模型及其实现[J].湖南大学学报(自然科学版),2006,33(6):119-122. 被引量:4

二级参考文献22

  • 1李涛.基于免疫的网络安全风险检测[J].中国科学(E辑),2005,35(8):798-816. 被引量:40
  • 2李涛.Idid:一种基于免疫的动态入侵检测模型[J].科学通报,2005,50(17):1912-1919. 被引量:26
  • 3周炎涛,郭如冰,李肯立,吴正国.基于前馈多层感知器的网络入侵检测的多数据包分析[J].计算机应用,2006,26(4):806-808. 被引量:5
  • 4HOFMEYR S, FORREST S. Immunity by Design: An Artificial Immune System [ C ]//Proceedings of the Genetic and Evolutionary Computation Conference (GECCO). San Francisco, CA: Morgan..Kaufmann, 1999 : 1289 - 1296.
  • 5HOFMEYR S, FORREST S. Architecture for an'Artificial Immune System [ J ]. Evolutionary Computation, 2000, 7 ( 1 ) :45 - 68.
  • 6AICKELIN U , CAYZER S. The Danger Theory and Its Application to AIS [ C ]// 1st International Conference on AIS. 2002:141-148.
  • 7CAYZER S, AICKELIN U. Recommender System based on the Immune Network [ C ]// Proceedings of the 2002 Congress on Evolutionary Computation ( CEC 2002). 2002:807 - 813.
  • 8GALLUCCI S, MATZINGER P. Danger signals: SOS to the immune system[ J]. Current Opinions in Immunology, 2001,13 : 114-119.
  • 9MATZINGER P. The Danger Model: A Renewed Sense of Self[ J]. Science, 2002,296:301 - 305.
  • 10莫宏伟.人工免疫原理及其应用[M].北京:电子工业出版社.2003.

共引文献19

同被引文献57

引证文献13

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部