网站大量收购独家精品文档,联系QQ:2885784924

基于免疫机理的侵测系统的研究.ppt

  1. 1、本文档共53页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
基于免疫机理的侵测系统的研究

Outline Context of Network Security Problem Significance of Studying Intrusion Detection Technique Advance in IDS Advance in AIS and its application to computer security Main research work Study methodology and notion Innovations and features of the dissertation References Context of Network security Problem Context of network security Problem Context of network security Problem Context of network security Problem Significance of Studying Intrusion Detection Technique Significance of Studying Intrusion Detection Technique Significance of Studying Intrusion Detection Technique Significance of Studying Intrusion Detection Technique Significance of Studying Intrusion Detection Technique Significance of Studying Intrusion Detection Technique Advance in IDS technique Advance in IDS technique Advance in IDS technique Advance in IDS technique Advance in IDS technique Advance in AIS and its application in computer security field Advance in AIS and its application in computer security field Advance in AIS and its application in computer security field Advance in AIS and its application in computer security field 5. Main study work Main study work Main study work Main study work Main study work Main study work Research method and thought Research method and thought Research method and thought Research method and thought 7. Main innovation and features of dissertation References Thanks for your attendance! 二、在以往文献的克隆选择算法中,关于检测器(抗体)亲和力进化,只用到了变异和选择算子,所以论文欲研究抗体进化的免疫算法,首次提出在该算法中增加了多克隆算子(McAb Operator)和接种疫苗算子(Vaccination Operator),目的是产生的检测器具有多样性、特异性、自学习性,能检测未知攻击。 三、在前面工作的基础之上,研究实现一个基于免疫机理的入侵检测系统,该检测系统不仅能检测网络层、传输层的攻击(IP探测、端口扫描、Dos攻击等),而且能检测应用层的攻击(如CGI、FTP、PHP注入漏洞攻击等)。在此过程中从理论上对检测率(detection rate)、漏检率(false positive error rate)、检测器覆盖(detector cover)、检测漏洞(detection hole)、检测器冗余进行分析。 四、在NIS中,“自我”是指机体的自身组成成份;在IDS中,“自我”是指合法的、可接受的操作模式或网络连接模式。利用免疫原理进行入侵检测研究的一个基础就是自我集的构造,根据negative selection算法的思想,检测器的产生依据就是自我集。在目前的研究中,自我集的构造是静态的,未考虑其动态进化,而且构造方法主要是在假定自我集的构造阶段不存在入侵事件的基础上,通过观察来定义。另外,由于自我集的构造是静态

文档评论(0)

135****6041 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档