A recognition model for network intrusion based on artificial immune system

被引:0
作者
Liu, Z [1 ]
Tan, L [1 ]
Zhou, MT [1 ]
机构
[1] Univ Elect Sci & Technol China, Coll Comp Sci & Engn, Chengdu 610054, Peoples R China
来源
WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2 | 2004年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among many kinds of IDSs(Intrusion Detection system),how to recognize and identify network intrusions is a base criterion to evaluate an IDS. Traditional IDS implements this by security rules matching. However, new network intrusions emerge in endlessly. Obviously this detecting way can't meet new situation's need and will be out of date in the near future. Aiming at this problem, This paper bring forward a new kind of recognition model of network intrusions which make use of immune antibody's self-organized learning ability and may accomplish the recognition for variation of network intrusions properly.
引用
收藏
页码:812 / 820
页数:9
相关论文
共 50 条
[41]   An Improved Artificial Immune Approach to Network Intrusion Detection [J].
Fang, Xianjin ;
Li, Longshu .
2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, :39-44
[42]   Novel immune system model and its application to network intrusion detection [J].
Ling, Jun ;
Cao, Yang ;
Yin, Jian-Hua ;
Huang, Tian-Xi .
Wuhan University Journal of Natural Sciences, 2003, 8 (2 A) :393-398
[43]   A Novel Immune System Model and Its Application to Network Intrusion Detection [J].
Ling Jun Cao Yang Yin Jianhua Huang TianxiSchool of Electronic Information Wuhan University Wuhan Hubei ChinaState Key Laboratory of Software Engineering Wuhan University Wuhan Hubei China .
WuhanUniversityJournalofNaturalSciences, 2003, (02) :393-398
[44]   Study of a multi-shape-gene artificial immune model for network intrusion detection [J].
Lu, J ;
Feng, BQ ;
Li, B ;
Rao, Y .
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, :1982-1985
[45]   Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection [J].
Kim, J ;
Bentley, PJ .
CEC'02: PROCEEDINGS OF THE 2002 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2002, :1015-1020
[46]   Recommender system model based on artificial immune system [J].
Mihaljevic, Branko ;
Cvitas, Ana ;
Zagar, Mario .
ITI 2006: PROCEEDINGS OF THE 28TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2006, :367-+
[47]   Intrusion detection system model based on the neural network [J].
Li, Hongpei ;
Wang, Xinmei .
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 1999, 26 (05) :667-670
[48]   Evolution induced Secondary immunity: An Artificial Immune System based Intrusion Detection System [J].
Dal, Divyata ;
Abraham, Siby ;
Abraham, Ajith ;
Sanyal, Sugata ;
Sanglikar, Mukund .
SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, :65-+
[49]   Research and Implementation of Intrusion Detection System Based on Artificial Neural Network [J].
Han Xiaocui .
MATERIALS AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 129-131 :1421-1425
[50]   Research on Immune based Adaptive Intrusion Detection System Model [J].
Deng, Lei ;
Gao, De-yuan .
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, :488-491