Font Size: a A A

Research Of Imitated Nature Immune System Based On Multi-Agent

Posted on:2007-11-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhaoFull Text:PDF
GTID:2178360212480114Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
According to the nature immunology, This paper describe a computer security model imitated the principles of nature immunity---------GECISM(General Computer Immune System Model). This model is structured by agents. The agent imitates the immune cells. Through rules and co-operation the agents discriminate"self"and"non-self". Furthermore, it eliminates"non-self". It becomes a very new method in research field that people get inspiration from the natural to solve the science problem, research the rules of the natural and in the end solve the problem that people faced. and provide a frame for adjusting the intensity of self-response. And based on this, an autonomic and self-adapting information safety system is constructed. It can monitor the processes real-time by dynamic analytic mechanism and give the alarm in good time, which effectively compensates the shortage of the other static tools.This paper applies checkpointing technology to reduce the computing loss through saving the valid state of normal running processes and restoring the disabled process according to the newest checkpoint after the system failures. Computer immune system GECISM(General Computer Immune System Model)which constituted by multi-agents is a production of the immune system applying in the computer security field. By comparing several different chechpoint mechanism, the TD agent in GECISM utilizes BRAS(Buffering RollbAck System)to realize its function, and makes the system rollback to the recent cleanliness status. And the paper expound some kinds of ways to improve the efficiency of the checkpointing.The paper expound the achievement of the checkpointing under user level in the Linux.
Keywords/Search Tags:Computer immune, the TC Agent, Multi-agent, Computer security
PDF Full Text Request
Related items