Font Size: a A A

Distributed Model Of Intrusion Detection System Based On Immunolog

Posted on:2008-04-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhongFull Text:PDF
GTID:2178360212476180Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The research purpose of Artificial Immune System is to extract special information processing mechanisms contained in biological immune system, and then to study and design the corresponding models and algorithms that could be used to solve many kinds of complex problems. Artificial Immune System is a novel intelligent Computing research field following the invention of Artificial Neural Network and Evolutionary Computation, and it is an emergent interdisciplinary research field generated by life science and computer science and has become a hot point.The basic function of biological immune system is to recognize self and non-self, and then to classify and eliminate non-self. Biological immune system has the characteristics of immune recognition, immune memory, immune regulation, immune tolerance, immune surveillance etc. It is a complex system of self-adaptive, self-learning, self-organization, parallel processing and distributed coordination. By deeply researching into various information processing mechanisms contained in biological immune system, many effective models of intrusion detection and algorithms can be established and designed, and it is of great significance to the establishment of new theory and new method of intrusion detection based on biological immune system, also to the change of the current situation of network security.The purpose of this dissertation is to explore and research into the learning and detecting mechanisms contained in biological immune system, and then to design efficient models and algorithms for intrusion detection system, to establish intrusion detection system based on biological immune system. The detecting models and algorithms based on biological immune mechanisms are designed with consideration of the...
Keywords/Search Tags:intrusion detection, detect unit, manage controller, similarity mutation mechanism, immune principle
PDF Full Text Request
Related items