Font Size: a A A

Artificial Immune Network Intrusion Detection System Applied Research

Posted on:2007-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z GuoFull Text:PDF
GTID:2208360182478806Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Intrusion detection is a highlighted topic of network security research in recent year. The computer criminal is more and more pressing and dangerous, which poses urgent demands on the performance of intrusion detection system. An intrusion detection system (IDS) is an automated system for the detection of computer system intrusions. The main goal of the IDS is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders. The big shortcoming of current intrusion detection system is unable to detect new type of attacks quickly and exactly. According to deeply researching into the theory and all kinds of information processing mechanisms within biological immune system, based on the work of former researchers, an Intrusion detection system models based on artificial immune theory was proposed in this paper.The main work done in this paper lies in the following:1) Introducing the research of intrusion detection in a mass, analyzing the development of intrusion detection techniques, analyzing the currently used intrusion detection techniques and concluding their drawbacks.2) Introducing the biological immune theory and working mechanisms within biological immune system, analyzing the negative selection algorithm, clone selection algorithm, comparing the techniques between intrusion detection system and artificial immune system.3) Based on the work of artificial immune system theory, proposing an Intrusion detection system model based on artificial immune, Analyzing the characters of the model, the relation of the function bodies, negative selection algorithm and the life cycle of the detection rules.4) Simulating the system of the new intrusion detection model, and comparing the differences between the model and the intrusion detection system based on the data mining.5) In the last, the improvement of the proposed model is give, attempting the incorporation of the data mining methods and artificial immune techniques, and the expected future work is described.
Keywords/Search Tags:Network Security, Intrusion Detection, artificial immune, negative selection algorithm, Fuzzy Clustering
PDF Full Text Request
Related items