期刊文献+

基于移动Agent的免疫入侵检测模型及算法 被引量:1

Model of intrusion detection based on mobile Agent & immune principle and algorithm
下载PDF
导出
摘要 结合移动agent技术和免疫系统的特性,从实际应用的角度出发,将两者的优势引入网络入侵检测系统的设计,提出了一个基于移动agent的免疫入侵检测系统MAgentIDS模型,并对其做了较为深入的研究。重点分析了用于入侵检测系统的免疫耐受模型,改进了检测分析agent采用的否定选择核心算法。开发了原型系统并模拟一些典型入侵行为,完成入侵检测系统的检测任务,实验结果表明该模型较原有的方法具有更好的适应性。 A model of intrusion detection based on the mobile agent technology and immune principle,called MAgentIDS,is presented from the aspects of the practical application,which utilizes the mobile agent technology and immune principle to solve the problems on the intrusion detection in the network security area.The immune tolerant model in the IDS is analyzed in especially,and the algorithm of negative selection used in the agent for analyzing is improved.The prototyping system is developed,and the emulational detection is accomplished by simulating the typical intrusions in the LAN.The experimental result indicates that the model is more adaptive than the original one.
作者 陈仲民 王宇
出处 《计算机工程与应用》 CSCD 北大核心 2008年第8期131-134,共4页 Computer Engineering and Applications
基金 国家自然科学基金( the National Natural Science Foundation of China under Grant No.60373066, No.60425206, No.90412003) 高等院校博士学科点专项科研基金( the China Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20020286004)
关键词 入侵检测 移动AGENT 免疫原理 否定选择算法 intrusion detection the mobile agent immune principle negative-selection algorithm
  • 相关文献

参考文献4

  • 1Ayara M,Timmis J,de Lemos R,et al,Negative selection:how to generate delectors[C]//the 1st International Conference on Artificial Immune Systems, 2002.
  • 2Hofmeyr S A,Forrest S.Architecture for an artificial immune system[J].Evolutionary Computation Journal,2000,8:443-473.
  • 3Kim J,Bentley P J.A model of gene library evolution in the dynamic clonal selection algorithm[C]//Proceedings of the First International Conference on Artificial Immune System,Canterbury,2002: 57-65.
  • 4王晋,李德全,冯登国.一种基于Agent的自适应的分布式入侵检测系统[J].计算机研究与发展,2005,42(11):1934-1939. 被引量:4

二级参考文献6

  • 1James P. Anderson. Computer security threat monitoring and surveillance. Washington: Anderson Co, Tech. Rep.: TR80904,1980.
  • 2D.E. Biswanath. An intrusion-detection model. IEEE Trans.Software Engineering, 1987, 13(2): 222~232.
  • 3S.R. Snapp, S. E. Smaha, D. M. Teal. The DIDS (distributed intrusion detection system) prototype. In: Proc. Summer 1992USENIX Conf. Berkeley, CA, USA: USENIX Association,1992. 227~233.
  • 4C. Krugel, T. Toth. Distributed pattern detection for intrusion detection. The Network and Distributed System Security Symposium Conf., San Diego, CA, 2002.
  • 5J.S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Lsacoff.Architecture for intrusion detection using autonomous DAAs.COAST Laboratory, Purdue University, Tech. Rep.: 9805,1998.
  • 6V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, et al.A distributed intrusion detection prototype using security agents.http :∥www. hpovua. org/Publications/Proceedings/11_hpovuaws/hpov2004/www/ConferenceProgramme. htm, 2004-12-05.

共引文献3

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部