Font Size: a A A

Research Of Key Technologies Of Intrusion Detection Based On Computer Immune

Posted on:2012-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:J F RuanFull Text:PDF
GTID:2218330368993578Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid popularity and development of the network and the increases of the network size and complexity,network security issues are also increasing prominently. People are suffering from more and more network attacks, so that network security problem is the first issue that people need to solve. Compared to the traditional passive defense firewall, intrusion detection is a proactive security protection technology, provides real-time protection from internal attacks ,external attacks and misuse. By reason of the mistakes and omissions of alarm ,single detection method, low capacity of active defense and other issues, existing intrusion detection techniques are lack of abilities to adapt to the complex environment and insufficient to meet the desired QoS. Intrusion detectionbased on computer immune is generated in this context needs, and becoming an important issue to the workers of network security. At present, intrusion detection based on computer immune is the core content and trends of intrusion detection.Intrusion detection system based on computer immune is more complex than the existing intrusion detection system.Intrusion detection system based on computer immune is based on the immune algorithm.Accounting for the the framework of the existing intrusion detection systems and key technologies from a macro point of view, a architecture of intrusion detection based on computer immune is proposed in this paper. Based on the architecture, the immunization module is to focus on design. Immune model includes three major modules: memory cell generation module, detection module mature cells, immature cells, tolerance module. The immunization module is mainly responsible for the immune antigen and antibody and the normal work of the entire immune system. The immunization module is the core of the intrusion detection system.Finally, in accordance with the data processing, design the experimental environment,and the results verify the design of the model has certain rationality.
Keywords/Search Tags:intrusion Detection, computer Immune, negative selection algorithm, clonal selection algorithm
PDF Full Text Request
Related items