全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2006 

一种基于免疫系统原理的信息安全系统新模型

, PP. 2455-2457

Keywords: 免疫系统,信息安全,移动代理

Full-Text   Cite this paper   Add to My Lib

Abstract:

信息安全系统可以从人体免疫系统的很多特点中得到启发.在本文利用人体免疫系统机制和信息安全系统之间的可比性设计了一个新的框架模型.该模型可以实现对重要信息的安全保护.该框架包含两个平行的信息传输网络:传统传输网和免疫淋巴网.传统传输网提供端到端服务,将重要信息从一个端点传输到另一个端点.免疫淋巴网提供校验和控制服务,用来监控和管理传统传输网的行为.本文还讨论了移动代理的安全性.本文针对免疫系统特点进行了相应的验证实验.实验结果表明该模型对于信息安全问题有较好的敌我识别功能.

References

[1]  Male D.Immunology-An Illustrated Outline[M].New York:Cower Medical Publishing Ltd,1986.
[2]  Forrest S,Hhfmeyr S A,Somayaji A.Computer immunology[J].Communications of the ACM.1997,40(10):88-96.
[3]  Boukerche A,Notate M S M A.Conception,Analysis and Development of a Security Management System for Telecommunication Networks[D].Brazil:Federal University of Santa Catarina,2000.
[4]  Dasgupta D,Nino F.A comparison of negative and positive selection algorithms in novel pattern detection[A].Proc IEEE Int Conf on Systems,Man and Cybernetics[C].Nashville,2000.125-130.
[5]  Kim J,Bentley P.The human immune system and network intrusion detection[A].7th European Congress on Intelligent Techniques and Soft Computing(EUFTT''99)[C].Aachen,Germany:Verlag Mainz,1999.13-19.
[6]  Hofmeyr S A,Forrest S,Architecture for an artificial immune system[J].Evolutionary Computation.2000,7(1):45-68.
[7]  Alberts B.Molecular Biology of the Cell[M].New York:Garland Science,Taylor & Francis Group,2002.
[8]  Timmis J I.Artificial Immune Systems:A Novel Data Analysis Technique Inspired by the Immune Network Theory[D].Aberystwyth:University of Wales,2000.
[9]  Harmer P,Williams P,Gunsch G,Lamont G.An artificial immune system architecture for computer security applications[J].IEEE Transactions on Evolutionary Computation,2002,6(3):252-279.
[10]  Harmer P.A Distributed Agent Architecture for a Computer Virus Immune System[D].US:Air Force Inst.Technology,Wright-Patterson AFB,OH,2000.
[11]  Dasgupta D,Dasgupta D.Artificial Immune Systems and Their Applications[M].Heidelberg,Germany:Springer-Verlag,1999.
[12]  Gray R S.Agent Tcl:A flexible and secure mobile-agent system[A],Proc.1996 Tcl/Tk Wksp[C].Milano,Italy:Springer Press,19916.9-23.
[13]  Gary M,Johannes P R,Anoop S.ANSWER:network monitoring using object-oriented rules[A].Proceedings of the Tenth Conference on Innovative Applications of Artificial Intelligence[C].Madison,Wisconsin:AAAI Press,1998.1087-1093.
[14]  Housley R.RFC 2459,Internet X.509 Public key Infrastructure Certificate and CRL Profile[S].1999.12-26.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133