计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 43-47.doi: 10.11896/j.issn.1002-137X.2014.12.010
冯翔,马美怡,赵天玲,虞慧群
FENG Xiang,MA Mei-yi,ZHAO Tian-ling and YU Hui-qun
摘要: 计算机安全系统与生物免疫系统具有很多的相似性,它们都需要在不断变化的环境中维持自身的稳定性。提出复合免疫算法,并应用到入侵检测系统中,以保护网络安全。针对经典的人工免疫算法在性能上存在的缺陷进行了改进,完善了其核心算法——否定选择算法,在否定选择算法中加入了分段技术和关键位,避免了恒定的匹配概率导致的匹配漏洞,降低了系统漏检率。并将遗传算法中的克隆选择算法和改进的否定选择算法结合为复合免疫算法,提高了检测器生成的动态性和多样性。最后,通过数学理论分析与仿真实验模拟,验证了改进算法的有效性和可行性,并且与其它经典算法进行了比较,结果证明,改进算法可以提高系统性能。
[1] anonymity.NET NEWS:Policing the Computer Underworld[J].Science,1998,282(11):1223-1224 [2] El-Khatib K.Impact of feature reduction on the efficiency ofwireless intrusion detection systems[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(8):1143-1149 [3] Wang Y,Fu W,Agrawal D.Gaussian Versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2013(2):342-355 [4] 方贤进,李龙澍,钱海.基于人工免疫的网络入侵检测中疫苗算子的作用研究 [J].计算机科学,2010,37(1):239-242 [5] 黄建忠,裴灿浩,谢长生,等.一种基于人工免疫技术的存储异常检测系统[J].计算机科学,2010,37(1):42-46 [6] Zhang Y,Wang L,Sun W,et al.Distributed intrusion detection system in a multi-layer network architecture of smart grids[J].IEEE Transactions on Smart Grid,2011,2(4):796-808 [7] Ou C M.Host-based intrusion detection systems adapted from agent-based artificial immune systems[J].Neurocomputing,2012(7):78-86 [8] Wu S X,Banzhaf W.The use of computational intelligence in intrusion detection systems:A review[J].Applied Soft Computing,2010,10(1):1-35 (下转第77页)(上接第47页) [9] Timmins J,Hone A,Stibor T,et al.Theoretical advances in artificial immune systems[J].Theoretical Computer Science,2008,3:11-32 [10] Yang J,Liu X J,Li T,et al.Distrubited agents model for intrusion detection based on AIS [J].Knowledge-Based Systems,2009,22:115-119 [11] Sobh T S,Mostafa W M.A cooperative immunological approach for detecting network anomaly [J].Applied Soft Computing,2011,11:1275-1283 [12] Powers S T,He J.A hybrid artificial immune system and self organising map for network intrusion detection [J].Information Sciences,2008,178:3024-3042 [13] Meisel M,Pappas V,Zhang L.A taxonomy of biologically inspired research in computer networking [J].Computer Networks,2010,54:901-916 [14] Visconti A,Tahayori H.Artificial immune system based on interval type-2 fuzzy set paradigm [J].Applied Soft Computing,2011,11:4055-4063 [15] Tsai C F,Hsu Y F,Lin C Y,et al.Intrusion detection by machine learning:a review [J].Expert Systems with Applications,2009(36):11994-12000 |
No related articles found! |
|