Font Size: a A A

Research Of Immune Agent Intrusion Detection Model In Private Network

Posted on:2019-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:W K LiFull Text:PDF
GTID:2428330542472990Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The Internet has shown a rapid development since its birth.People's lifestyles and access to information have changed with each passing day.The same is true for the private networks.While enjoying the convenience that the network brings to us,we are also faced with the problem of network security,such as malicious intrusion,virus spreading,stealing personal information and so on.Unlike the Internet,the security of the private network relates to the security of the state,the secrets of the government,and the interests of the people,so it has a high demand for safety.At present,there is no uniform security strategy for the security of private network,traditional firewalls and other technologies are only passive.Once a security issue occurs,it can lead to serious consequences.Apart from the physical connection with the outside,the private network has only some passive defense technologies such as traditional firewalls.Aiming at this problem,this paper proposes an intrusion detection model suitable for private network.The model combines Agent technology with artificial immune technology.It has the ability to actively detect abnormalities.The system Combine several different kinds of mobile agents form a detection module.and make it place in the key node of the private network.Combined with artificial immune theory,the immune Agent with detection function is generated.At the same time,the response Agent can respond in a timely manner in case of an emergency.The administrator manages the entire detection system through the Agent management platform.This model makes the private network more secure based on existing passive defense technologies such as firewalls,encryption,and virus prevention.In the face of unusual events,it can also take timely measures to minimize losses.This paper aims at the problem of matching rules in the traditional negative selection algorithm and combines the special network environment in the private network to improve the matching rules.This paper combining Hamming distance matching rules and r-block matching rules based on traditional r-successive matching rules.By adding the new controllable parameters to control the detector generation process,this process is more suitable for private network environments.It improves the detector's generation efficiency and quality.Enables the entire system to handle different situations and adapt to the security requirements of the private network.Experimental results show that compared with traditional defense methods,this model has faster response speed and better detection capability for the abnormal behavior in the private networks.To a certain extent,it improved the security of the private network,makes the defense of the private network more three-dimensional.
Keywords/Search Tags:private network, intrusion detection, immunity principle, mobile Agent
PDF Full Text Request
Related items