Font Size: a A A

Based On Artificial Immune Network Security Mechanisms

Posted on:2006-08-06Degree:MasterType:Thesis
Country:ChinaCandidate:B LiFull Text:PDF
GTID:2208360152497431Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the wide application of the computer and enhancement of globalinterconnection, the security question of the computer is outstanding day by daytoo. And the solution of present anti-virus and network intrusion detection has todetect the unusual mode through using the known characteristic, control normalcomputer program and network operating position at the same time, so thenetwork may collapse under the burden of catching and analyzing the virusinfection and intrusion attack. From the inspiration of the biological immunesystem, researchers proceeds from biological prototype, abstracts to correspondingimitative life mechanism, form a new field--Artificial Immune System.Utilize artificial immunity mechanism to solve intrusion detection andcomputer virus defense become a front subject in the computer security research.This paper has a detail analysis of network security technology at first, such ashacker attack course,unusually intrusion detection,data encryption, and so on,especially has a summary of the security technology in broadband network andwireless network which are extensively used at present. On the basis, with theanalysis of biological characteristic,immune algorithm and immune model in theartificial immunity, regards the normal behavior mode and communication modeamong the local host computer and network systems monitored as "self", regardsunusually as "nonself" , thus a network security model based on artificialimmunity mechanism is set up.The model is on the basis of clone selection algorithm, adopts multi-agentstechnology,host / network structure with multi layers and multistage and peculiarsecurity strategies, have the characteristic of distribution, robust, adaptability andexpansibility.The contents of the dissertation are distributed as follows:Introduction of network security theory and developments.Analysis of the technology in network security.Analysis of the AIS, and its applications in computer security field.Implement of a network security model based on the AIS.Draw a conclusion and have an analysis of future research direction.
Keywords/Search Tags:network security, artificial immunity, intrusion detection, security model
PDF Full Text Request
Related items