基于免疫原理的入侵检测算法研究
作者:
基金项目:

国家基金(60473024)


Research on Intrusion Detection Algorithm Based on Immune System
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [1]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    参考文献
    1 Dasgupta, D. Immunity-based intrusion detection system: A general framework. In: Proc.22nd Nat.Information Systems Security Conf., Oct. 1999. 147-160. 2 S. A. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evol. Comput, 2000,8(4) :443-473. 3 Dipankar D., Fabio G.. An immunity-based technique to characterize intrusion in computer networks. IEEE transaction on evolutionary computation, 2002,6: 281-291. 4 D. Dasgupta. Artificial Immune Systems and Their Applications. New York: Springer-Verlag, 1999. 5 Mobile security agents for network traffic analysis. Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX-II). Los Alamitos, CA: IEEE Comput. Soc. Press, 1999. 6 J. O. Kephart.A biologically inspired immune system for computers. Proceedings of Artificial Life IV, R. Brooks and P. Maes, Eds. Cambridge, MA: MIT Press, 1994. 130-139. 7 J.Kim, P.Bentley. The Human Immune System and Network Intrusion Detection.EUFIT'99, September, 1999. 8 Novelty detection in time series data using ideas from immunology. Proc. Int. Conf. Intelligent Systems.1996. 87–92. 9 P.Dhaeseleer,S.Forrest,and P. Helman. An immunological approach to change detection: Algorithms. Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy. Los Alamitos, CA: IEEE Comput. Soc. Press, 1996.110-119. 10 A. Somayaji, S. Hofmeyr, and S. Forrest.Principles of a computer immune system. Proc. 2nd New Security Paradigms Workshop, Sept. 1997. 75-82. 11 Leandro N de Castro, Fernando J Von Zben.. Immune and neural network models: theoretical and empirical comparisons. International Journal of Computational Intelligence and Applications, 2001, 1(3):239 257. 12 Mahalanobis,P.C..On the Generalized Distance in Statistics. Proceedings of the National Institute of Science, Calctta, 12.49-55. 13 Liu-Hailong,Ding-Xiaoqing. Handwritten Chinese character recognition based on mirror image learning and the compound Mahalanobis function. Journal of Tsinghua University. 2006,46(7):1239-1242. 14 梅长林、范金城, 数据分析方法, 北京: 高等教育出版社, 2006:142-153. 15 DARPA Intrusion Detection Evaluation (1999). http://www.ll.mit.edu/IST/ideval/index.html.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

裴凯,王卫红.基于免疫原理的入侵检测算法研究.计算机系统应用,2008,17(3):19-22

复制
分享
文章指标
  • 点击次数:1706
  • 下载次数: 2925
  • HTML阅读次数: 0
  • 引用次数: 0
历史
文章二维码
您是第11307969位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号