[1]王倩云 罗玉漂 陈云芳.未知木马检测免疫算法的r值分析[J].计算机技术与发展,2012,(12):175-178.
 WANG Qian-yun,LUO Yu-piao,CHEN Yun-fang.Numerical Analysis of r in Immune Algorithm of Unknown Trojan Detection[J].,2012,(12):175-178.
点击复制

未知木马检测免疫算法的r值分析()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年12期
页码:
175-178
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Numerical Analysis of r in Immune Algorithm of Unknown Trojan Detection
文章编号:
1673-629X(2012)12-0175-04
作者:
王倩云1 罗玉漂1 陈云芳2
[1]南京邮电大学理学院[2]南京邮电大学计算机学院
Author(s):
WANG Qian-yunLUO Yu-piaoCHEN Yun-fang
[1]College of Science, Nanjing University of Posts and Telecommunications[2]College of Computer, Nanjing University of Posts and Telecommunications
关键词:
人工免疫木马检测检测器
Keywords:
artificial immune Trojan detection detector
分类号:
TP309
文献标志码:
A
摘要:
免疫算法具备的轻量级、分布式和自我进化等特性能够有效解决信息安全领域中的未知木马的检测问题,弥补传统木马技术上的缺陷。文中详细阐述了未知木马检测免疫算法及详细的检测流程,从检测器的生成及检测过程两个角度总结了检测中存在的问题,并给出了抗原检测方向的一个分析图。根据人工免疫原理,采用阴性选择算法和r连续位匹配算法,对人工免疫未知木马检测系统中的一个重要参数r值进行了仔细的分析与测试。实验测试结果表明检测器集越大,系统检测性能越好,系统的检测性能与检测参数r值是紧密相关的
Abstract:
Immune algorithm with the lightweight, distributed and self evolution characteristics can solve the problem efficiently of unknown Trojan detection which is in the domain of information security. It makes up for the defect of traditional Trojan detection technolo gy. It discusses concretely the immune algorithm of unknown Trojan detection and the process of detection, and summarizes the existent problem from both detector generating and detection's process perspectively. A chart of trend of antigen detection is also proposed. Ac cording to the artificial immune theorem,negative selection algorithm and r bit sequence match algorithm is applied,the significant parameter r in the artificial immune system about the unknown Trojan detection is carefully analysed. Experimental results show that the greater the detection set is, the better detecting performance the system has, and the system's performance and detecting parameter r are closely related

相似文献/References:

[1]付玉珍 胡彧 张清华.一种新的自适应网络入侵检测模型[J].计算机技术与发展,2008,(09):148.
 FU Yu-zhen,HU Yu,ZHANG Qing-hua.A New Model of Self- Adaptive Network Intrusion Detection[J].,2008,(12):148.
[2]张葵 袁细国.基于模糊集的免疫克隆选择算法[J].计算机技术与发展,2007,(12):24.
 ZHANG Kui,YUAN Xi-guo.An Immune Colon Selective Algorithm Based on Fuzzy- Set[J].,2007,(12):24.
[3]任永昌 朱萍.克隆选择算法分析及其改进的研究与应用[J].计算机技术与发展,2012,(05):101.
 REN Yong-chang,ZHU Ping.Research and Application of Clone Selection Algorithm Analysis and Its Improvement[J].,2012,(12):101.
[4]李京.基于危险理论的网络安全风险评估[J].计算机技术与发展,2012,(08):159.
 LI Jing.Evaluation Model for Network Security RiskBased on Danger Theory[J].,2012,(12):159.

备注/Memo

备注/Memo:
中国博士后科学基金项目(20090451241)王倩云(1991-),女,从事信息与计算科学研究;陈云芳,副教授,硕士生导师,主要研究方向为信息安全、入侵检测、移动代理、人工免疫等
更新日期/Last Update: 1900-01-01