期刊文献+

计算机免疫中基于移动代理的规则提取与规则库构造

Rules Extracting and Rule Bases Constructing Based on Mobile Agent in Computer Immune
下载PDF
导出
摘要 计算机免疫系统是防护计算机安全的新兴技术,类MC Agent是计算机免疫系统模型GECISM中的一个代理,是模仿生物免疫系统区分计算机系统中“自我”和“非我”的主要部分.重点介绍了类MC A-gent的设计与实现,包括系统调用短序列的采集、规则的提取以及规则库的构造. Computer immune system is a new technology in area of computer security . MC Agent is a main component of the agents in computer security model GECISM, whose main function is to distinguish "self" and "nonself" by initating biology immune system. This paper describes the design and realization of MC Agent. The main parts include the collection of system call sequences , the extraction of rules and the constitution of rule bases.
出处 《河北大学学报(自然科学版)》 CAS 北大核心 2006年第4期443-448,共6页 Journal of Hebei University(Natural Science Edition)
基金 河北省科技厅指导计划项目(3213502)
关键词 计算机免疫系统 移动代理 MC AGENT 系统调用 判决链 computer immune system mobile agent MC Agent system call adjudication chain
  • 相关文献

参考文献12

  • 1SOMAYJI A,HOFMEYR S A,FORREST S.Principles of a computer immune system[Z].New Security Paradiagms Workshop,ACM,Cumbria UK,1998.
  • 2王凤先,刘振鹏,李继民,常胜.一种仿生物免疫的计算机安全系统模型[J].小型微型计算机系统,2003,24(4):698-701. 被引量:18
  • 3FORREAT S,HOFMEYR S A,SOMAYAJI A,et al.A sense of self for UNIX processes[Z].In Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy,Los Alamitos CA,1996.
  • 4HOFMEYR S A,FORREST S,SOMAYAJI A.intrusion detection using sequences of system calls[J].Journal of Computer Security,1998(6):151-180.
  • 5SOMAYAJI A,FORREAT S.Automated response using system-call delays[Z].In Proceedings of the 9th USENIX Security Symposium,Denver,Colorado,USA,2000.
  • 6FORREST S,PERELSON A S,ALLEN L,et al.Self-nonself discrimination in a computer[Z].In Proceedings of the 1994 IEEE Symposium on Computer Security and Privacy,Oakland,CA,1994.
  • 7梁意文,潘海军,康立山.免疫识别器构造的多级演化[J].小型微型计算机系统,2002,23(4):441-443. 被引量:11
  • 8LEE W,STOLFO S J,CHAN P K.Learning patterns from unix process execution traces for intrusion detection[Z].In Proceedings of the AAA197 workshop on AI Approaches to Fraud Detection and Risk Management,Providence,Khode Island,1997.
  • 9LEE W,STOLFO S J.Data mining approaches for intrusion detection[Z].In Proceedings of the 7th USENIX Security Symposium,Texas,1998.
  • 10王凤先 胡陈丽 张岩.基于系统调用的入侵检测[J].计算机工程与应用,2004,40:79-81.

二级参考文献7

  • 1童竞亚.医学免疫学与微生物学(第三版)[M].北京:人民卫生出版社,1996.208.
  • 2Maria Nevia Ferrara,Andrea Torre.Automatic moving target detection using a rule-based system:comparison between different study cases[C].In:1998 IGRASS '98 1998 IEEE International,1998 ;3(6):1593~1595
  • 3郁文贤.[D].国防科技大学,1988.
  • 4L Devroye.Automatic Pattern Recognition:A Study of Probability of Error[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1998;10(4):530~543
  • 5M W Kurzynski,J Sas.Rule-Based Classification Procedures Related to the Unprecisely Formulated Expert Rules[C].In:Proceedings SIBGRAPI98 International Symposium,1998-10:241~245
  • 6(美)马奎斯德萨著 吴逸飞译.模式识别-原理、方法及应用[M].北京:清华大学出版社,2002..
  • 7戴志锋,何军.一种基于主机分布式安全扫描的计算机免疫系统模型[J].计算机应用,2001,21(10):24-26. 被引量:6

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部