Font Size: a A A

Study On The Intrusion Detection System Based On Computer Immunology

Posted on:2009-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:G JieFull Text:PDF
GTID:2178360242489258Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Along with the computer network daily popularization and the application, the network information security also is more and more attended. As the second-generation network security technology, intrusion detection technology has become a key research in recent years. Immune-based intrusion detection can explore natural immune logical theories, mechanisms and principles for detecting and reacting to intrusions. Also it can detect unknown attack modes according to immature information, which has great actual significance. Several aspects were probed into as follows.Firstly, on the basis of studying the working mechanism of artificial immune system completely the paper makes some improvement on existing artificial immune model. The modification includes design of detector, co-stimulation, mutation and evolution of memory strings, making the artificial immune model easier to realize. The paper also devises a network-based intrusion detection system according to the improved model. The IDS takes network packets as detecting data resource and has the advantages of detecting unknown intrusion, distributed disposition.Secondly, the paper researched on the detector generating algorithms, which is the key algorithm in the system. By the analyses on the existing detector generating algorithms, we achieved the improvement of the linear time detector generating algorithm, which was widely used at present. The efficiency of the linear algorithm was improved by eliminating the reluctant detectors, and at the same time the improved algorithm was ensured to cover the nonself space as much as possible.Afterwards, analyzing the reason of detecting holes on the basis of generating algorithms. The thesis proposed a kind of new algorithms on computing detection holes and summarized the detector generating algorithms, at the same time, pointing out the questions existing in the algorithm.Finally, the initialization detector set scale and the failure probabilities of detector generating algorithm have been tested and the test results indicate that the improved algorithm enhanced the maturity and the reliability contrasting with the former algorithm.A new way was introduced to the fields of computer safety system through this thesis. The proposed detector generating algorithms has great potential.
Keywords/Search Tags:Intrusion detection, Computer immune model, Negative selection, Detecting holes
PDF Full Text Request
Related items