期刊文献+

免疫学原理在入侵检测中的应用研究 被引量:9

Immunology principle and its application investigation in intrusion detection
下载PDF
导出
摘要 评述了近年来免疫原理在入侵检测中的应用,着重讨论抗体克隆选择学说、免疫网络学说和危险模式理论的应用研究现状,对所采用的免疫机制和算法进行了总结,并介绍了研究的热点问题。最后在分析入侵检测方法存在问题的基础上,探讨了今后研究的方向。 Immunology principle and its application in intrusion detection in recent years were reviewed. The research on antibody clonal selection theory, immune networks and danger theory were emphasized. The immune principle and algorithms used in intrusion detection were summarized and some of hotly debated issues were introduced. Based on the disadvantages of current methods, the development directions were discussed.
出处 《计算机应用》 CSCD 北大核心 2005年第8期1726-1729,1743,共5页 journal of Computer Applications
基金 兵器预研支撑基金资助项目(YJ0467011) 教育部留学回国人员科研基金资助项目(LXKYJJ200308)
关键词 人工免疫系统 入侵检测 阴性选择 独特型网络 危险模式理论 <Keyword>artificial immune system intrusion detection negative selection idiotypic netwoks danger theory
  • 相关文献

参考文献33

  • 1焦李成,杜海峰.人工免疫系统进展与展望[J].电子学报,2003,31(10):1540-1548. 被引量:224
  • 2AICKELIN U, GREENSMITH J, TWYCROSS J. Immune System Approaches to Intrusion Detection - A Review, Proceedings International Conference on Artificial Immune Systems [ C]. Catania, Italy,2004.316 - 329.
  • 3HOFMEYR S, FORREST S. Architecture for an AIS[ J]. Evolutionary Computation, 2000, 7(1): 1289 - 1296.
  • 4赵俊忠,黄厚宽,田盛丰.免疫机制在计算机网络入侵检测中的应用研究[J].计算机研究与发展,2003,40(9):1293-1299. 被引量:31
  • 5KIM J, BENTLEY P. Evaluation of negative selection in an artificial immune for network intrusion detection[ A]. Proceedings of the GECCO[ C]. 2001. 1330 - 1337.
  • 6KIM J, BENTLEY P. Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection[ A]. Proceedings of Genetic and Evolutionary Computation Conference (GECCO '99 )[C]. Orlando, Florida, 1999. 149 - 158.
  • 7DASGUPTA D, GONZALEZ F. An Immunity - Based Technique to Characterize Intrusions in Computer Networks[ J]. IEEE Transactions on Evolutionary Computation, 2002, 6(3): 1081 - 1088.
  • 8KIM J, BENTLEY P. The Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator[ A]. The Congress on Evolutionary Computation(CEC-2001) [C]. Seoul, Korea, 2001. 1244 - 1252.
  • 9KIM J, BENTLEY P. Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection[ A]. The Congress on Evolutionary Computation[ C]. 2002. 1015- 1020.
  • 10KIM J, BENTLEY P. Immune Memory in the Dynamic Clonal Selection Algorithm[ A]. Proceedings of the First International Conference on Artificial Immune Systems(ICARIS) [ C]. Canterbury,2002.57 - 65.

二级参考文献108

  • 1戴汝为,王珏.关于智能系统的综合集成[J].科学通报,1993,38(14):1249-1256. 被引量:52
  • 2戴汝为,王珏.巨型智能系统的探讨[J].自动化学报,1993,19(6):645-655. 被引量:39
  • 3陆德源.现代免疫学[M].上海:上海科学技术出版社,1998.14-16.
  • 4学科交叉和技术应用专门小组(美).学科交叉和技术应用[R].北京:科学出版社,1994.43.
  • 5[英]PM利迪亚德 A惠兰 M W范杰.林慰慈 薛彬 魏雪涛译.免疫学[M].北京:科学出版社,2001..
  • 6DASGUPUTA D, ATTOH-OKINE N. Immunity-based systems: A survey [A]. Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics [C]. Orlando, Florida, USA:[s.n.], 1997: 369-374.
  • 7JERNE N K. The immune system [J]. Scientific American, 1973,229(1): 52-60.
  • 8JERNE N K. Towards a network theory of the immune system[J]. Ann Immunological(Inst Pasteur), 1974,125C:373-389.
  • 9PERELSON A S. Immune network theory[J]. Immunological Reviews, 1989,110(5): 5-36.
  • 10FORREST S, PERELSON A S, ALLEN L, et al. Self-nonself discrimination in a computer [A]. Proceeding of IEEE Symposium on Research in Security and Privacy [C]. Oakland:[s.n.], 1994: 202-212.

共引文献264

同被引文献52

引证文献9

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部