期刊文献+

人工免疫算法在网络入侵检测中的应用 被引量:13

Application of Immune Algorithm in Network Intrusion Detection
下载PDF
导出
摘要 研究网络安全问题,由于网络受到各类攻击,当前入侵检测系统的最大问题是不能快速检测出新出现的异常入侵和较高的误报率。为了提高网络入侵检测正确率,提出一种人工免疫的网络入侵检测算法。网络入侵检测算法模拟了人工免疫系统中的匹配、否定选择、记忆等机制,通过人工免疫的"自我"和"非自我"识别能力对网络入侵行为进行检测。最后在Matlab平台上,对KDD CUP1999网络入侵数据集进行验证性测试,实验结果表明,提出的算法简单,检测准确,能识别出未知入侵信息,提高了检测效率,为设计提供了依据。 Intrusion detection is the research hotspot in network security.Intrusion detection system cannot fast detect new abnormal invasion and the rate of false positives is higher.In order to improve the detection accuracy of network intrusion,a network intrusion detection algorithm is put forward based on artificial immune network.Artificial immune algorithm has adaptability,robustness and good characteristics,"self" and "nonself" are reconditioned by artificial immune algorithm.Finally the proposed method is tested by the KDD CUP1999 network intrusion dataset in Matlab,experimental results show that the proposed method is simple and accurate,and can identify new detection intrusion and improve the detection efficiency.
作者 刘韬 皮国强
出处 《计算机仿真》 CSCD 北大核心 2011年第11期91-94,共4页 Computer Simulation
关键词 免疫算法 入侵检测 网络安全 Immune algorithm Intrusion detection Network security
  • 相关文献

参考文献7

二级参考文献138

  • 1柴晨阳,孙星明,吴志斌,智云生.基于神经网络集成的入侵检测研究[J].计算机应用,2007,27(6):1363-1364. 被引量:3
  • 2[英]PM利迪亚德 A惠兰 M W范杰.林慰慈 薛彬 魏雪涛译.免疫学[M].北京:科学出版社,2001..
  • 3Lou Der - Chyuan, Liu Chiang - Lung, Lin Chih - Lin. Message estimation for universal steganalysis using multi - classification support vector machine[ J]. Computer Standards & Interfaces, 2009, 31 (2) :420 -427.
  • 4Huang Cheng - Lung, Wang Chieh - Jen. A GA - based feature selection and parameters optimizationfor support vector machines [J]. Expert Systems with Applications, 2006,31 (2) :231 -240.
  • 5Anderson Alvarenga de Moura Meneses, Marcelo Domellas Machado, Roberto Schirru. Particle Swarm Optimization applied to the nuclear reload problem of a Pressurized Water Reactor [ J ]. Progress in Nuclear Energy, 2009,51 (2) :319 - 326.
  • 6S Suresh, P B Sujit, A K Rao. Particle swarm optimization approach for multi - objective composite box - beam design [ J ]. Composite Structures, 2007,81 (4) :598 - 605.
  • 7[1]AXELSSON S. Intrusion Systems: A Survey and Taxonomy[R]. Technical Report 99-1S, Depart Of Computer Engineering, Chalmers University, 2000.
  • 8[2]FISK M, VARGHESE G Fast Content-based Packet Handling for Inuusion Detection[R]. Technical Report CS2001-0670, University of California, San Diego, Department of Computer Sciencee and Engineexing. 2001.
  • 9[3]ROESCH M. Snort lightweight intrusion detection for network[A]. Proceedings of the 13th System Administration Conference[C].Seattle, Washington, USA, 1999. 229-238.
  • 10[4]MCALERNEY J, COIT C, STANIFORD S. Towards faster string matching for intrusion detection or exceedingthe speed of snort[A]. DARPA Information Survivability Conference and Exposition[C]. Anaheim, California, 2001. 367-373.

共引文献339

同被引文献70

引证文献13

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部