Font Size: a A A

The Research Of Network Security Active Defense Technology Based On Biological Immunity

Posted on:2011-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:W Y WangFull Text:PDF
GTID:2218330368482516Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Biology immune system naturally has strong ability of self-preservation, which can protect itself from external harmful substance such as bacteria and virus by learning. As an important active defense technology in network security system, the problems which Intrusion Detection System facing are amazing similar with the characters of the Biology Immune System, so that the application of the biology immune theory in intrusion detection can make up the deficiency in active defense technology. It is a new topic that the application research of biology immune system in information security field.To implementation active defense for detection system,it is the key technology that detection system should embody the qualified detector and the cooperation of detector should be fast and effective. The research of this paper involves:how to generate the qualified effective detector, how to configure reasonable detectors, and how to construct robustness, scalability, adaptive and light load of active defense model. To generation qualified and effective detection devices, this paper specifically completes the following work:First, how to generate a more mature detector which quickly and efficiently and to improve the detector ability of anomaly detection based on immune principle;Second, it is intended to improve the detector detection rate and reduce the false alarm rate based on immune principle. In the structural model of the process of active defense, the main topic of configuring the detector to enable a good functional properties of simulated cells are studied and designs a network security active defense model based on the principle of immune, and simulation experiments are carried out validation by immune algorithm.
Keywords/Search Tags:network security, active defense, biological immunity, detector
PDF Full Text Request
Related items