期刊文献+

一种基于免疫原理的入侵检测方法 被引量:2

在线阅读 下载PDF
导出
摘要 针对传统入侵检测技术的一些缺陷,提出一种基于免疫原理的入侵检测方法。该方法通过“自体”和“非自体”两次刺激对数据进行分类,并利用反馈机制使系统进行自我调整,以适应网络状态的变化。实验结果表明,该方法可以较好地区分正常和异常的网络数据,需要较少的协同刺激,具有较好的自适应性。
作者 李树文 孙敏
出处 《计算机应用》 CSCD 北大核心 2006年第S2期68-70,共3页 journal of Computer Applications
基金 山西省高校科技开发项目(20051202) 山西大学科研项目(2005103) 横向科研项目
  • 相关文献

参考文献9

  • 1葛丽娜,钟诚.基于人工免疫的入侵检测系统负选择并行算法[J].计算机工程,2005,31(12):138-140. 被引量:8
  • 2梁可心,李涛,刘勇,陈桓.一种基于人工免疫理论的新型入侵检测模型[J].计算机工程与应用,2005,41(2):129-132. 被引量:13
  • 3潘志松,陈松灿,张道强.一种基于人工免疫原理的入侵检测系统模型[J].数据采集与处理,2003,18(1):22-26. 被引量:8
  • 4FARMER JD,,PACKARD NH,PERELSON AS.The Immune System,Adaptation,and Machine Learning. Physica D Nonlinear Phenomena . 1986
  • 5BENTLEY P,KIM J.Immune Memory in the Dynamic Clonal Se-lection Algorithm. 1st International Conference on Artificial Im-mune Systems(ECARIS-2002) . 2002
  • 6STEVEN H,,STEPHANIE F.Architecture for an Artificial Immune System. Evolutionary Computation . 1999
  • 7STEPHANIE F,STEVEN H.Computer Immunology. Communications of the ACM . 1997
  • 8KIMJ,,BENTLEY P.Negative selection within an artificial immune system for network intrusion detection. Proceedings of Genetic and Evolutionary Computation Conference . 1999
  • 9KIRNJ,,BENTLEY P.The artificial immune model for network intru-sion detection. 7th European Conference on Intelligent Techniques and Soft Computing . 1999

二级参考文献15

  • 1KimJ Bentley P.The artificial immune model for network intrusion detection[A]..7th European Conference on Intelligent Techniques and Soft Computing (EUFIT′99)[C].,1999.13~19.
  • 2Jungwon Kim ,Peter J Bentley.Towards an Artificial Immune System for Network Intrusion Detection:An investigation of Dynamic Clonal Selection[C].In:the Congress on Evolutionary Computation(CEC-2002), Honolulu, 2002-05-12-17 : 1015 - 1020.
  • 3Junwon KJm,Peter J Bentley.Immune Memory in the Dynamic Clonal Seleetlon Algorithm[C].In:Proeeedings of the First International Conference on Artificial Immune Systems (ICARIS) Canterbury, 2002-09- 9-11:57-65.
  • 4Junwon Kim,Peter J Bentley.A Model of Gene Library Evolution in the Dynamic Clonal Selection Algorithm[C].In:Proceedings of the First International Conference on Artificial Immune Systems(ICARIS) Canterbury, 2002-09-9-11 : 57-65.
  • 5Paul K Harmer,Paul D Williams,Gregg H Gunsch et al.An Artificial Immune System Architecture for Computer Security Applications [J].IEEE Transaction on Evolutionary Computation,2002;6(3).
  • 6Stephanie Forrest,Alan S Perelson.Self-Nonself Discrimination in a Computer[C].In:IEEE Symposium on Security and Privacy,Oakland, CA, 1994-05 : 16-18,202.
  • 7Steven Andrew Hofmeyer.An Immunological Model of Distributed Detection and Its Application to Computer Security[D].PhD Dissertation.University of New Mexico, 1999.
  • 8吴敏毓 刘恭植.医学免疫学[M].合肥:中国科学技术大学出版社,1995.1-219.
  • 9Forrest S, Perelson A. Self-nonself Discrimination in a Computer[C].Proceeding of 1994 IEEE Symposium on Research in Security and Privacy, Los Alamos, CA: IEEE Computer Society Press,1994:202-212.
  • 10Hofmery S, Forrest S. Architecture for an Artificial Immune System[J]. Evolutionary Computation, 2000,7(1):45-68.

共引文献24

同被引文献8

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部