It becomes a very new method in research field that people get inspiration from the natural to solve the science problem, research the rules of the natural and in the end solve the problem that people faced. Using the mechanism of the biologic immune system in the research of Computer Intrusion Detection, the computer immune system model is put forward. In this model, some traits of the biologic immune system are utilizing to distinguish non-self from self, eliminate non-self and provide a frame for adjusting the intensity of self-response. This paper gives a way to conform an important function module of the GECISM, Imitate B Agent, and analyses the allocation of the Imitate B Agent. This agent recept the classified information of nonself offered by Imitate TH and then eliminate the nonself with the eliminate method database and the character database.If the nonself can not be eliminated,Imitate B Agent will try to classify the nonself again, it can also communicate with other agents.
|