Font Size: a A A

Studies On Application Of Artificial Immune Systems To The Network IDS

Posted on:2006-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:X M QianFull Text:PDF
GTID:2168360155965438Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, with the rapid development of the network technology, the current situation of network security is becoming more and more worrying. All kinds of technology of network security are ceaselessly developed with the appearance of the importance of network security. Network intrusion detection system is an important means to enhance network security. An intrusion detection system (IDS) is an automated system for the detection of computer system intrusions. The main goal of an IDS is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruder. The character of artificial immune systems can satisfy the practical requirement of intrusion detection technology. The network intrusion detection model based on the artificial immune systems can improve the security of computer network. We construct the distributed network intrusion detection model which is come from the principle of artificial immune systems and the improved dynamic clonal selection algorithm .The primary contributions of this paper are as following: 1. The resemblance of the construction from the analogy of the mapping relations between artificial immune systems and network intrusion detection system, put forward the possibility and the necessity of network intrusion detection system model based on artificial immune systems . 2. We describe the co_stimulation mechanism of the lymphocytes, the dynamic updating mechanism, tolerance mechanism of B cell and immune memory mechanism in the model. We research their achievement methodology and analyse them how to improve the detection efficiency in the model. Finally, we explain their important impact on enforce the adaption and robust of the system model. 3. Firstly, we analyse the dynamic clonal selection algorithm, Secondly, put forward a network intrusion detection model which is based on artificial immune theorem and intrusion detection demand, Finally, give a definition for the model and fulfill the main function of the model using Visual C++6.0. 4. The usability and creativeness of the model verified by TCP connecting 4-tuples, analyse the effect of every parameter on the system, and draw some relate conclusion.
Keywords/Search Tags:Artificial Immune Systems, Network Security, System Security, the Dynamic Clonal Selection, Intrusion Detection
PDF Full Text Request
Related items