Font Size: a A A

Adaptive Layered Immune System

Posted on:2008-10-06Degree:MasterType:Thesis
Country:ChinaCandidate:M CengFull Text:PDF
GTID:2208360212975293Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
With the development of the Internet, the network application has already extend to each corner of people's life.The development of the network has bring tremendous convenience to people's living and work, on the other hand, the illegal network intrusion has also put forward a hard nut to crack to provide the safety of information .Now the illegal entry increasing continuously brings the enterprises and the personal the huge economy lose.But the traditional safety protection technique,such as attestation,authorization,interview control,fire wall,encryption etc, has already lack the ability to do.So the safety of the computor network information faces tremendous threat and the challenge.The Intrusion Detection System, IDS is an active measure to guarantee the safety of information, and made up blemish of the traditional technical availably.At the same time,it constructs a dynamic and safe circulation to advande the system's ability to guarantee a safety furthest and reduce bane which a safety threat brings to the system.But with the development of the intrusion detection technology, the technique for invade is also a continuous progress.It is the hotpot that IDS examines a new appears of invade behavior andt the misinformation rate is reduced receptible.Then,this text put forward a layered intrusion detectionkind model according to the biologic immune principle and the contrast of the calculator system and the biologic immune system.This text relies on the foundation research item of Sichwan science and technology hall(the Key Technique Research of the Intelligence IDS).Further more,it totaly introduces the principle of the intrusion detection and the biologic immune systemthe and the work mechanism. Generally this textual innovation is to design and realize a kind of layering intrusion detectionkind model.And finally it carries on code and verifies to the prototype.The Snort realizes the data collect,the data analysis and the fast detection to known Invade behavior by zhe help of mature IDS.The Snort examination rule type is similar to the inborn immunity function in biologic immune system.The realization of acquired immune function is a self-adapt process.The textual point is to realise the self-adapt process. It establishes zhe self-adapt esimitating to carry out the living creature body outward the boundary invade of from adapt of process, then built up have from the immunity detector of the adaptability, and the immunity detector.At the same time.the immunity detector combines to the mature IDS to let she system has the self-adapt.In experimentation, it adopts the American Columbia University calculator science's network intrusion detection validate it.And the result of the experiment prove that this model realize zhe examination on zhe unknown intrusion data.
Keywords/Search Tags:Intrusion Detection, Detector, Self- adapt, Snort, Biologic immune System
PDF Full Text Request
Related items