期刊文献+

基于人工免疫系统的计算机安全研究 被引量:3

A Research of Computer Security Base On Artificial Immune System
原文传递
导出
摘要 本文首先从分析生物免疫系统入手,剖析生物免疫系统的工作原理,在此基础上构建了针对计算机安全的人工免疫系统模型。并从理论上对生物免疫系统与计算机免疫系统的相似之处做了比较,然后对人工免疫系统在计算机安全中的应用做了进一步的阐述。最后对人工免疫系统在计算机安全领域的应用进行了展望。 The paper is begin with the analyzing of biological immune,based on which builds an artificial immune system(AIS) referring to computer security.The similarity of computer immunology and artificial immune system is presented.Then the paper discusses the application of AIS in the computer security.At last the future direction and emphasis of the application of AIS in the field of computer security are pointed out.
作者 章登科 葛红
出处 《网络安全技术与应用》 2007年第1期21-23,共3页 Network Security Technology & Application
关键词 人工免疫系统 生物免疫系统 计算机安全 入侵检测 artificial immune system biological immune system computer security intrusion detect
  • 相关文献

参考文献11

二级参考文献31

  • 1S. A. Hofmeyr and S. Forrest. Architecture for an Artifieial Immune System[J]. Evolutionary Computation Journal, 2000.
  • 2Kerphart J. O., et al.. Biological inspired defenses against computer viruses[C]. Proc 14^[th] hat Joint Conf Artificial Intelligence,San Mateo,USA.
  • 3Chile Hare,Karanjit Siyan.Internet Firewalls、and Network Security[M].Prentice Hall,1996.
  • 4Bruce Sehneier.Applied Cryptography(2nd edition)[M].John Wiley&Sons Inc,1996.
  • 5S.Forrest,A.S.Perelson,L.AIlen,R.and Cherukuri.Self-Nonself Discrimination in a Computer[C].In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy,Los Alamitos,CA:IEEE Computer Society r Press,1994.
  • 6FORREST S, PERELSON A, ALLEN L, et al. Self-non-self discrimination in a computer [ A]. Proceedings of the IEEE Symposium on Research in Security and Privacy[ C ]. Los Alamitos: IEEE Computer Society Press,1994.
  • 7D' HASESSELEER P, FORREST S, HELMANP. Animmunological approach to change detection: algorithms,analysis, and applications [ A ]. Proceedings of the IEEE Symposium on Research in Security and Privacy [ C ].Los Alamitos: IEEE Computer Society Press, 1996.
  • 8KIM J, BENTLEY P. Negative selection and niching by an artificial immune system for network intrusion detection[ A ]. Proceedings of Genetic and Evolutionary Computation Conference [ C ]. San Francisco: Morgan Kaufmann Publishers, 1999.
  • 9KIM J, BENTLEY P. Negative selection within an artificial immune system for network intrusion detection [ A ].Proceedings of Genetic and Evolutionary Computation Conference[C]. San Francisco: Morgan Kaufmann Publishers. 1999.
  • 10HOFMEYR S A, FORREST S. Immunity by design: an artificial immune system[ A]. Proceedings of Genetic and Evolutionary Computation Conference [ C ]. San Francisco: Morgan Kaufmann Publishers, 1999.

共引文献55

同被引文献12

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部