Font Size: a A A

Research On An Intrusion Detection Technology Based On Biological Immune System

Posted on:2002-06-26Degree:DoctorType:Dissertation
Country:ChinaCandidate:M JiangFull Text:PDF
GTID:1118360032456622Subject:Aviation Aerospace Manufacturing Engineering
Abstract/Summary:PDF Full Text Request
AbstractWith the rapid development of computer and communication technologies, computer applications are widely and deeply step-by-step. Meanwhile computer security is remarkable and complex. To some extent, security technologies and products can provide protection for computer and network, but not complete because of their own vulnerability. So how to prevent computer and network from a variety of attacks in progress becomes an important problem to be solved. Particularly, it is very important to our aeronautics and astronautics industry.The thesis includes seven chapters. Chapter one expounds the necessity of using intrusion detection technologies. It discusses the related research and main content to be studied in the thesis. Taking the ttaditional security model as the clue, chapter two analyzes computer security vulnerability and the advantage and disadvantage of kinds of intrusion detection technologies. Finally, it is proposed that applying the mechanisms of biological immune system to intrusion detection technology study. Chapter three introduces the features and mechanisms of biological immune system in detail, and gives a computer intrusion detection system based on the natural immune system. Chapter four is engaged in the research of its key technologies deeply. Chapter five analyzes the holes of the current incomplete security system of the FIBOW-CIMS. Chapter six shows that the above intrusion detection system was added to the incomplete security system of the FIB OWCIMS so as to detect computer viruses. In chapter seven, the research is concluded.
Keywords/Search Tags:Computer Security, Traditional Security Model, Security Vulnerability, Intrusion Detection, Biological Immune System, Contemporary Integrated Manufacturing System, Computer Viruses
PDF Full Text Request
Related items