当前位置:主页 > 管理论文 > 移动网络论文 >

人工免疫机制在网络入侵检测系统研究与实现

发布时间:2018-05-31 23:42

  本文选题:人工免疫 + 抗体 ; 参考:《电子科技大学》2014年硕士论文


【摘要】:随着网络信息技术的发展,让人们对信息的感受越来越深刻,网络的资源共享、信息传播快捷、资源平等性特征越来越受到社会的认可。网络信息给国家经济发展、国家安全、社会稳定和军事斗争等方面带来各种隐患。从当前的状况看,主要体现在金融、电信和军事等部门和行业,其信息化程度已经达到了很高的水平。论文通过分析研究提出了基于人工免疫的网络入侵检测模型,对人工免疫系统进行分析研究,通过对入侵在传统网络安全的影响,选择性地研究动态克隆,并寻找入侵检测体系的漏洞。漏洞包括自体集合臃肿、RCMF配对原则缺乏效率、含有很多缺陷、任意r位间隔匹配规则与分隔算法一起使用。本文提倡自体模式类提高信息检测速率,也能完成自体集合的即时检测,取得不错的结果。本文描述了这个模型如何运作,并探讨了自体模式类、记忆抗体类等检测模块的使用时间等问题。从生物免疫入侵监测系统角度分析,主要是对生物的有机体进行仿真模拟,保证所受保护的系统能够把非法行为和自我的合法行为进行区分。生物免疫系统主要是对外部病毒入侵进行干预,从而保护生物体的安全,生物体在对病原体进行抵抗之后就会产生一种自身的保护能力,也就是通常说的免疫能力。如果病原体在下次入侵生物体的事后,生物体能够有效防御。
[Abstract]:With the development of the network information technology, people feel more and more deeply about the information. The network resources share, the information dissemination is quick, the resources equality characteristic is more and more recognized by the society. Network information brings various hidden dangers to national economic development, national security, social stability and military struggle. From the current situation, mainly reflected in the financial, telecommunications and military departments and industries, its information level has reached a very high level. In this paper, a network intrusion detection model based on artificial immunity is put forward, and the artificial immune system is analyzed and studied. Through the influence of intrusion on the traditional network security, the dynamic clone is studied selectively. And look for the vulnerability of intrusion detection system. Vulnerabilities include a lack of efficiency in the self-set bloated RCMF pairing principle, a number of flaws, and arbitrary r bit spacing matching rules used in conjunction with the partition algorithm. In this paper, the autologous pattern class is proposed to improve the rate of information detection, and can also complete the real-time detection of the autologous set, and good results are obtained. This paper describes how this model works and discusses the usage time of detection modules such as autologous pattern class memory antibody class and so on. From the point of view of biological immune intrusion monitoring system, the simulation of biological organism is carried out to ensure that the protected system can distinguish illegal behavior from self-lawful behavior. The biological immune system mainly interferes with the invasion of external virus to protect the organism. After the organism resists the pathogen, it will produce its own protective ability, that is, the immune ability. If the pathogen is able to defend itself effectively after the next invasion of the organism.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08

【参考文献】

相关期刊论文 前4条

1 凌军,曹阳,尹建华,徐国雄,黄天锡;基于小生境技术的多样性抗体生成算法[J];电子学报;2003年08期

2 罗敏,王丽娜,张焕国;基于无监督聚类的入侵检测方法[J];电子学报;2003年11期

3 杨维,李歧强;粒子群优化算法综述[J];中国工程科学;2004年05期

4 李宁,刘飞,孙德宝;基于带变异算子粒子群优化算法的约束布局优化研究[J];计算机学报;2004年07期

相关硕士学位论文 前1条

1 李超;基于免疫的网络入侵检测系统研究[D];河北科技大学;2012年



本文编号:1961881

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1961881.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户d3555***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com