期刊文献+

基于危险理论与数理统计的入侵检测模型 被引量:8

Intrusion detection model based on danger theory and mathematical statistics
下载PDF
导出
摘要 分析了危险理论的基本机制,针对处理危险信号的特点,提出了基于特征串HAMMING距离的数理统计匹配算法,并以该算法来优化协同信号的产生,以及操作抗原与抗体的匹配,最后给出了基于该算法的入侵检测模型。 The paper analyzes the primitive mechanism of the danger theory,according to the features of processing danger signal,an intrusion detection model is presented based on the mathematical statistics matching algorithm which is originated from the HAMMING distance of character string,in order to optimize the method of generating coordinate signal and to operate the matching of antigen and antibody.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第11期136-138,共3页 Computer Engineering and Applications
基金 湖北省科技厅自然科学基金(the Natural Science Foundation of China Hubei Provincial Science & Technology Department No.2004009200)
关键词 计算机免疫 危险理论 入侵检测 危险信号 数理统计 computer immune danger theory intrusion detection danger signal mathematical statistics
  • 相关文献

参考文献6

二级参考文献22

  • 1谷雨,徐宗本,孙剑,郑锦辉.基于PCA与ICA特征提取的入侵检测集成分类系统[J].计算机研究与发展,2006,43(4):633-638. 被引量:25
  • 2[1]Eskin E.Anomaly Detection over Noisy Data Using Learned Probability Distributions. In Proc. 17th International Conf. on Machine Learning,2000:255-262
  • 3[2]Dagupta D,Gonzalez F.Information Assuarance in Computer Networks.Chapter An Intelligent Decision Support System for Intrusion Detection and Response,2001:1 - 14
  • 4[3]Forrest S,Perelson A,Allen L,et al.Self-nonself Discrimination in a Computer. In Proc. IEEE Symp. on Research in Security and Privacy,1994
  • 5[4]Kephart J.A Biologically Inspired Immune System for Computers.In:Proceedings of Artificial Life, 1994:130-139
  • 6[5]Kim J,Bentley P J.An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection. In:Proceedings of the Genetic and Evolutionary Computation Conference,2001 :1330-1337
  • 7Dennis L Chao, Stephanie Forrest. Information immune systems [C]. Proceedings of the first international conference on artificial immune systems, England: University of Kent at Canterbury Printing Unit, 2002. 132-140.
  • 8Jeffrey O Kephart. A biologically inspired immune system for computers[A]. Integrity computing laboratory[C]. Artificial life Ⅳ: Proceedings of the fourth international work-shop on the synthesis and simulation of lying systems, US: MIT Press, 1994.130-139.
  • 9Patrik D'haeseleer, Stephanie Forrest, Paul Helman. An immunological approach to change detection: algorithms, analysis and implications[C]. 1996 IEEE Symposium on Security and Privacy,Oakland, Ca: IEEE, 1996.
  • 10Stephanie Forrest, Alan S Perelson, Lawrence Allen, et al. Selfnonself discrimination in a computer [C]. Proceedings of the 1994 IEEE symposium on research in security and privacy, Los Alamitos, CA: IEEE Computer Society Press, 1994.

共引文献45

同被引文献48

引证文献8

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部