期刊文献+

基于免疫机制的校园网安全模型设计 被引量:2

Design of a campus intranet security model based on immunity mechanism
在线阅读 下载PDF
导出
摘要 以生物免疫理论为基础,设计了校园网络安全防护体系模型,并对系统的测试方案和实施方案做了预测,提出了下一步研究方向。 Based on the theory of biological immunity,we designed a campus intranet security system.The paper predicts the testing scheme and implementation of the system and proposes direction for further research.
出处 《中国医学教育技术》 2011年第4期389-392,共4页 China Medical Education Technology
关键词 生物免疫 网络安全 入侵检测 分布式系统 biological immunity network security intrusion detection distributed system
  • 相关文献

参考文献9

二级参考文献31

  • 1卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:237
  • 2[1]Lee S C,Heinbuch D V.Training a neural-network based intrusion detector to recognize novel attacks.IEEE Transactions on Systems,Man and Cybernetics,part A,2001;31(4):294-299
  • 3陈慰峰.医学免疫学[M].北京:人民卫生出版社,2001..
  • 4Anchor K P'Williams P D'Gunsch G H'et al.The computerdefense immune system:current and future research in intrusion detection [A].Proceedings of the 2002 Congress on Evolutionary Computation (CEC '02)[C].2002.1027- 1032.
  • 5Zhao J Z'Huang H K.An evolving intrusion detection system based on natural immune system [A].Proceedings of IEEE Region 10 Conference on Computers'Communications'Control and Power Engineering (TENCON '02) [C].2002.129-132.
  • 6Tarakanov A O'Skormin V A.Pattern recognition by immunocomputing[A].Proceedings of the 2002 Congress on Evolutionary Computation (CEC'02) [C].2002.938-943.
  • 7Jungwon K'Bentley P J.Towards an artificial immune system for network intrusion detection:an investigation of dynamic clonal selection [A].Proceedings of the 2002 Congress on Evolutionary Computation (CEC '02) [C].2002.1015-1020.
  • 8Forrest S, Hofmeyr S A,Somayaji A,et al.A sense of self for unix processes [A]. In Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1996.
  • 9Forrest S,Perelson A S, Allen L,et al. Self-Nonself iscrimination in a Computer [C]. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 202-212, Oakland, May 16-18 1994.
  • 10James P Anderson. Computer Security Threat Monitoring and Surveillance [R]. Technical Report, James P. Anderson Co., Fort Washington, PA, April 1980.

共引文献47

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部