期刊文献+

基于人工免疫的计算机安全行为防范模型 被引量:2

Computer safety model for behavioral protection based on artificial immunity
在线阅读 下载PDF
导出
摘要 基于人工免疫的计算机信息安全策略,以行为防范为主要目的,提出行为防范安全模型,有效抵制入侵行为和病毒等侵害,解决计算机领域内诸多的安全问题.变病毒库为行为库,通过行为模式控制,避免大量病毒库的频繁升级工作;利用自适应免疫,改变原来只能检测已知攻击,不能防范未知攻击的弱点,最终实现信息安全. On the basis of artificial immunity-based computer information safety strategy and taking behavioral protection as major objective,a behavioral protection safety model was put forwards,which could effectively resist the invading behavior and computer virus,and solve dozens of problems of safety in the computer area.It changed the virus base into a behavioral base,so that plenty of frequent updating work of the virus base could be avoided by controlling behavioral model.The adaptive immunity was used to overcome its demerit that only the known attacks could be detected and it was unable to protect itself from unknown attacks, so that the final goal of information safety would be reached.
作者 崔志磊
机构地区 苏州市职业大学
出处 《兰州理工大学学报》 CAS 北大核心 2009年第4期107-110,共4页 Journal of Lanzhou University of Technology
关键词 计算机安全 行为模式 信息安全 自适应免疫 computer safety behavioral mode information safety adaptive immunity
  • 相关文献

参考文献7

  • 1DE CASTRO L N,TIMMIS J.Artificial immune systems:a new computational intelligence approach[M].Berlin:Springer,2002.
  • 2DASGUPTA D,NINO F.A framework for evolving multi-shaped detectors in negative selection[M].Boca Raton:CRC Press,2005.
  • 3崔志磊,房岚,陶文林.一种全新的网络安全策略——蜜罐及其技术[J].计算机应用与软件,2004,21(2):99-101. 被引量:34
  • 4GLICKMAN M,BALTHROP J,FORREST S.A machine learning evaluation of an artificial immune system[J].Evolutionary Computation Journal,2005,13(2):179-212.
  • 5BEAUCHEMIN C,FORREST S,KOSTER F.Modeling influenza viral dynamics in tissue[C]// The 5th International Conference on Artificial Immune Systems (ICARIS).Oeiras:[s.n.],2006:23-36.
  • 6INGHAM K,SOMAYAJI A,FORREST S,et al.Learning DFA representations of HTTP for protecting web applications[J].Journal of Computer Networks,2007,51(5):1239-1255.
  • 7DASGUPTA D,GONZALEZ F,VEMURI V R.Artificial immune systems in intrusion detection[M].Taylor:Auerbach Publications,2005:165-208.

二级参考文献2

  • 1RobertLemos.Honeypotsgetstickierforhackers. http:∥www.news.com.com . 2003
  • 2LanceSpitzner.HoneypotsDefinitionsandValueofHoneypots. http:∥www.tracking hackers.com . 2003

共引文献33

同被引文献15

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部