Font Size: a A A

The Design And Implementation Of Computer System Resources Defense Model Based On Multi-agent Technology And Artificial Immune Theory

Posted on:2006-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:G F LiFull Text:PDF
GTID:2178360182460492Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The aim of computer system security is concerned with the protection of computer system resources integrity availability and confidentiality. Computer virus harms your computer system resources seriously, The current anti-virus technology used for the defence of computer system resources emphasizes particularly on eliminating computer virus codes, It is a method of defencing computer system resources indirectly, ignoring the measure of defencing computer system resources directly.This article studies mainly the feasibility of defencing computer system resources to protect computer system security. The main work is as follows:1. In this dissertation, we first propose the basic conception of computer system resources defense, and make a through study on the feasibility of improving computer system security by the method of protecting computer system resources to prevent computer virus from running in computer system from theoretically.2. We introduce the basic principle of immunology in chief, and discuss the basic theory of shape-space the basic immune cell models the main design and application of artificial immune systems .3. We study the basic ideas of artificial immune systems models based on Multi-agent technology, the application of artificial immune systems based on Multi-agent technology is discussed.4. The basic principle of computer system resources defense model is set forth, A computer system resources defense model based on Multi-agent technology is built, and some of the techniques in the model are studied.5. The computer system resources defense model is applied to build a process monitor system, and the basic principle and the arithmetic of the process monitor system are set forth.
Keywords/Search Tags:anti-virus technology, computer system resources defense, artificial immune systems, multi-agent technology, process monitor
PDF Full Text Request
Related items