欢迎来到天天文库
浏览记录
ID:36504445
大小:2.26 MB
页数:58页
时间:2019-05-11
《基于计算机免疫的入侵检测技术研究》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、北京交通大学硕士学位论文基于计算机免疫的入侵检测技术研究姓名:解功申请学位级别:硕士专业:信号与信息处理指导教师:梁满贵20080601ABSTRACTABSTRACT:Alongwiththecomputernetworkdailypopularizationandtheapplication,thenetworkinformationsecurityalsoismoreandmoreattended.Asthesecond—generationnetworksecuritytechnology,intrusiondetectiontechnologyhasbecomeakeyres
2、earchinrecentyears.Immune—basedintrusiondetectionCanexplorenaturalimmunelogicaltheories,mechanismsandprinciplesfordetectingandreactingtointrusions.Alsoitcalldetectunknownattackmodesaccordingtoimmatureinformation,whichhasgreatactualsignificance.SeveralaspectsWereprobedintoasfollows.Firstly,ontheb
3、asisofstudyingtheworkingmechanismofartificialimmunesystemcompletelythepapermakessomeimprovementonexistingartificialimmunemodel.Themodificationincludesdesignofdetector,CO-stimulation,mutationandevolutionofmemorystrings,makingtheartificialimmunemodeleasiertorealize.Thepaperalsodevisesanetwork-base
4、dintrusiondetectionsystemaccordingtotheimprovedmodel.TheIDStakesnetworkpacketsasdetectingdataresourceandhastheadvantagesofdetectingunknownintrusion,distributeddisposition.Secondly,thepaperresearchedonthedetectorgeneratingalgorithms,whichisthekeyalgorithminthesystem.Bytheanalysesontheexistingdete
5、ctorgeneratingalgorithms,weachievedtheimprovementofthelineartimedetectorgeneratingalgorithm,whichWaswidelyusedatpresent.Theefficiencyofthelinearalgorithmwasimprovedbyeliminatingthereluctantdetectors,andatthesametimetheimprovedalgorithmWasensuredtocoverthenonselfspaceasmuchaspossible.Afterwards,a
6、nalyzingthereasonofdetectingholesonthebasisofgeneratingalgorithms.Thethesisproposedakindofnewalgorithmsoncomputingdetectionholesandsummarizedthedetectorgeneratingalgorithms,atthesametime,pointingoutthequestionsexistinginthealgorithm.Finally,theinitializationdetectorsetscaleandthefailureprobabili
7、tiesofdetectorgeneratingalgorithmhavebeentestedandthetestresultsindicatethattheimprovedalgorithmenhancedthematurityandthereliabilitycontrastingwiththeformeralgorithm.Anewwaywasintroducedtothefieldsofcomputersafetysystemthrou
此文档下载收益归作者所有