基于先进计算的智能入侵检测系统研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计算机技术的发展改变了人类的生活,但是病毒入侵的风险性和机会也相应急剧增加。设计安全措施来防范未经授权访问地震信息系统的资源和数据,是当前地震系统主机或者地震信息网络安全领域的一个十分重要而迫切的问题。网络安全问题也是开展地震研究必须解决好的重要课题。入侵检测技术是近20年出现的一种主动保护自己免受攻击的网络安全技术,它在不影响网络性能的情况下对网络进行检测,从而提供对内部攻击、外部攻击和误用操作的实时保护。
     在分析了入侵检测系统的一些基础理论之后,作者指出了引入先进机器学习与进化计算方法实现入侵检测系统的必要性。提出了基于非平衡数据支撑向量机的入侵检测方法、基于人工免疫危险理论的入侵检测方法以及基于免疫危险克隆规划入侵检测方法,所做具体创新内容如下:
     (1)提出基于支撑向量机的和非平衡数据的入侵检测方法。首先介绍了入侵检测中的非平衡资料问题,针对该问题,建立了非平衡数据快速支撑向量机分类器,并利用它实现了一种新型的入侵检测系统。该算法具有如下优点:(a)考虑了非平衡数据对于学习机性能的影响,通过非平衡LSSVM实现了具有较强推广能力的入侵检测系统;(b)由于采用LSSVM将学习过程中的不等式约束变为等式约束,大大降低了训练过程的复杂度。最后采用该方法对KDDCup1999数据集中的连线特征字段进行分类,分析并对比了检测结果的正确率并评估检测效率。结果说明了其有效性。
     (2)提出基于聚类算法和危险理论的入侵检测方法。针对传统人工免疫机制的入侵检测系统自体与非自体难以精确区分的问题,引入危险理论来实现更加高效的入侵检测。该算法具有如下优点:(a)利用模糊C均值聚类算法预处理找到数据中心的近似位置,再利用危险理论寻找出最适当的聚类数目与较好的聚类中心,大大节约入侵检测系统的处理时间。(b)避免了传统免疫IDS系统自我/非我集过大问题,将免疫响应与危险信号相关联。根据危险信号浓度的大小判断是否是入侵行为。在KDDCup1999数据集上验证了其性能。结果说明了其有效性。
     (3)提出基于免疫危险克隆规划的入侵检测方法。随着时间的增长,免疫危险入侵检测算法中自体库会变得十分庞大,自体耐受时间将呈指数增长。为了进一步降低免疫危险入侵检测方法的时间复杂度,提出一种免疫危险克隆规划入侵检测算法,来加快免疫算法的收敛速度。该算法具有如下优点:(a)利用克隆操作代替传统的进化操作中的交叉、变异和选择操作,在大规模优化问题求解时具有更快的求解速度。(b)能够克服免疫算法容易收敛到局部极小值的缺陷。在KDDCup1999数据集上验证了其性能。结果说明了其有效性。
The development of computer technology has changed human life, but the risk of viruses and the chance of a sharp increase. Design of security measures to guard against unauthorized access to earthquake information system resources and data, is the current host or seismic information network security field seismic system is a very important and urgent issue. The issue of network security is to carry out seismic studies to be solved an important issue. Intrusion detection technology is nearly20years, a pro-active network security technology to protect themselves from attack, it does not affect network performance, network detection, thus providing the attacks on the internal and external attacks and misuse of the operation of real-time protection.
     Some of the basic theory of intrusion detection system, the authors noted that the introduction of advanced machine learning and evolutionary computation method to realize the need for intrusion detection systems. Proposed intrusion detection method based on support vector machines non-equilibrium data, the intrusion detection method based on artificial immune danger theory as well as intrusion detection method based on immune dangerous cloning planning, done by a specific innovation as follows:
     (1) The proposed intrusion detection method based on support vector machines and unbalanced data. First introduced the problem of intrusion detection in non-equilibrium data, the non-equilibrium data for fast support vector machine classifier, and use it to achieve a new type of intrusion detection systems. The algorithm has the following advantages:(a) consider the impact of non-equilibrium data for the performance of the learning machine, non-equilibrium LSSVM with strong generalization ability of intrusion detection systems;(b) due LSSVM will learn in the process of inequality constraints into equality constraints and greatly reduces the complexity of the training process. Finally, the connection on the KDD Cup1999data set characteristics field classification, analysis and compare the rate of correct test results and to assess the detection efficiency. Results demonstrate its effectiveness.
     (2) The proposed intrusion detection method based on clustering algorithms and dangerous theory. Difficult to accurately distinguish between the problem of intrusion detection system of the traditional artificial immune mechanisms and non-self, the introduction of dangerous theory to achieve a more efficient intrusion detection. The algorithm has the following advantages:(a) the use of fuzzy C-means clustering algorithm for preprocessing to find the approximation of the data center location, the use of dangerous theory to find out the most appropriate number of clusters and good cluster centers, and significant savings in the intrusion detection system processing time,(b) avoid the traditional immune IDS system of self/not my set too large, the immune response to danger signals. According to the size of the judgment of the danger signal concentration is a intrusion. KDDCup1999data sets to verify its performance. Results demonstrate its effectiveness.
     (3) The proposed intrusion detection method based on immune dangerous cloning planning. With the growth of time, the immune dangerous intrusion detection algorithm autologous library will become very large, autologous tolerance time will increase exponentially. To further reduce the time complexity of immune danger of intrusion detection methods, raised the risk of an immune clone planning intrusion detection algorithm to speed up the convergence rate of Immune Algorithm. The algorithm has the following advantages:(a) the use of cloning operation instead of the traditional evolutionary operations of crossover, mutation and selection operations, the faster the speed of solving large-scale optimization problem solving,(b) be able to overcome the immune algorithm is easy to converge to a local minimum of defects. KDDCup1999data sets to verify its performance. Results demonstrate its effectiveness.
引文
陈会忠.2007.地震信息系统发展综述.地球物理学进展,22(4):1142-1146
    刘云华,刘治,单新建,李卫东.2011.地震研究,24(1)96-101
    焦李成,杜海峰,刘芳,公茂果.免疫优化计算、学习与识别[M].北京:科学出版社.2006年6月第一次印刷
    段云所,魏仕民,唐礼勇等.信息安全概述.北京:高等教育出版社.2003.9.
    卿斯汉,蒋建春.网络攻防技术原理与实战[M].北京:科学出版社.2004:30-107
    薛英花,吕述望,苏桂平等.入侵检测系统研究.计算机工程与应用,2003,39(1):150.152
    周伟达.核机器学习方法研究.博士论文,西安电子科技大学,西安,中国,2003.
    李涛.计算机免疫学[M].北京:电子工业出版社,2004:100-120.
    高超,王丽君.基于系统调用的入侵检测技术研究[J].信息安全与通信保密,2005(7):322-336.
    肖人彬,壬磊.人工免疫系统:原理,模型,分析及展望.计算机学报.2002.2
    钟将,吴中福,吴开贵,欧灵.基于人工免疫网络的动态聚类算法.电子学报,2004.8
    丁菊玲,刘晓洁,李涛等.基丁二人工免疫的网络入侵动态取证.四川大学学报(工程科学版),2004.9
    莫宏伟,吕淑萍,管风旭.基于人工免疫系统的数据挖掘技术原理与应用[J].计算机工程与应用2004,28-33
    董元方.2011.机器学习中的模型选择问题研究.[博士学位论文].吉林大学
    史旭华.2011.基于多Agent系统的人工免疫网络及其应用研究.[博士学位论文].华东理工大学
    张义荣.2005.基于机器学习的入侵检测技术研究.[博士学位论文].国防科学技术 大学研究生院
    朱永萱.2006.基于模式识别的入侵检测关键技术研究.[博士学位论文].北京邮电大学
    努尔布力.2010.基于数据挖掘的异常检测和多步入侵警报关联方法研究.[博士学位论文].吉林大学
    刘若辰.2005.免疫克隆策略算法及其应用研究.[博士学位论文].西安电子科技大学
    徐立芳.2007.免疫克隆选择算法应用研究.[博士学位论文].哈尔宾工程大学
    葛红.2003.免疫算法及核聚类人工免疫网络应用研究.[博士学位论文].华南理工大学
    谷琼.2009.面向非均衡数据集的机器学习及在地学数据处理中的应用.[博士学位论文].中国地质大学
    刘丽.2008.人工免疫网络研究及应用.[博士学位论文].江南大学
    张楠.2006.人工免疫系统的混沌机制及在网络入侵检测中的应用.[博士学位论文].四川大学
    王飞.2010.入侵检测分类器设计及其融合技术研究.[博士学位论文].南京理工大字
    赵静.2010.网络协议异常检测模型的研究与应用.[博士学位论文].北京交通大学
    常甜甜.2010.支持向量机学习算法若干问题的研究.[博士学位论文].西安电子科技大学
    罗喻.2007.支持向量机在机器学习中的应用研究.[博士学位论文].西南交通大学
    谷方明.2010.支持向量数据描述的若干问题及应用研究.[博士学位论文].吉林大学
    朗风华.2008.基于人工智能理论的网络安全管理关键技术的研究.[博士学位论文].北京邮电大学
    徐慧.2006.基于免疫机理的入侵检测技术研究.[博士学位论文].南京理工大学
    陈振国.基于智能计算的入侵检测方法研究[硕士学位论文].西安电子科技大学.2005
    El-Khatib, K.;, "Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems," Parallel and Distributed Systems, IEEE Transactions on, vol.21, no.8,pp.H43-1149, Aug.2010
    Jiong Zhang; Zulkernine, M.; Haque, A.;, "Random-Forests-Based Network Intrusion Detection Systems," Systems, Man, and Cybernetics, Part C:Applications and Reviews, IEEE Transactions on, vol.38, no.5, pp.649-659, Sept.2008
    Jie Liu; Yu, F.R.; Chung-Horng Lung; Tang, H.;, "Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks," Wireless Communications, IEEE Transactions on, vol.8, no.2, pp.806-815, Feb.2009
    Kai Hwang; Min Cai; Ying Chen; Min Qin;, "Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes," Dependable and Secure Computing, IEEE Transactions on, vol.4, no.1, pp.41-55, Jan.-March 2007 doi:10.1109/TDSC.2007.9
    Kemmerer, R.A.; Vigna, G.;, "Hi-DRA:Intrusion Detection for Internet Security," Proceedings of the IEEE, vol.93, no.10, pp.1848-1857, Oct.2005
    Nong Ye; Xiangyang Li; Qiang Chen; Emran, S.M.; Mingming Xu;, "Probabilistic techniques for intrusion detection based on computer audit data," Systems, Man and Cybernetics, Part A:Systems and Humans, IEEE Transactions on, vol.31, no.4, pp.266-274, Jul 2001
    Parikh, D.; Tsuhan Chen;, "Data Fusion and Cost Minimization for Intrusion Detection," Information Forensics and Security, IEEE Transactions on, vol.3, no.3,pp.381-389, Sept.2008
    Sooyeon Shin; Taekyoung Kwon; Gil-Yong Jo; Youngman Park; Rhy, H.;, "An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks," Industrial Informatics, IEEE Transactions on, vol.6, no.4, pp.744-757, Nov.2010
    Tavallaee, M.; Stakhanova, N.; Ghorbani, A.A.;, "Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods," Systems, Man, and Cybernetics, Part C:Applications and Reviews, IEEE Transactions on, vol.40, no.5, pp.516-524, Sept.2010
    Tartakovsky, A.G.; Rozovskii, B.L.; Blazek, R.B.; Hongjoong Kim;, "A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods," Signal Processing, IEEE Transactions on, vol.54, no.9, pp.3372-3382, Sept.2006
    Zhenwei Yu; Tsai, J.J.P.; Weigert, T.;, "An Automatically Tuning Intrusion Detection System," Systems, Man, and Cybernetics, Part B:Cybernetics, IEEE Transactions on, vol.37, no.2, pp.373-384, April 2007
    Mukherjee, B.; Heberlein, L.T.; Levitt, K.N.;, "Network intrusion detection," Network, IEEE, vol.8, no.3, pp.26-41, May-June 1994
    Ryutov, T.; Neuman, C.; Dongho, Kim.; Li, Zhou.;, "Integrated access control and intrusion detection for Web servers," Parallel and Distributed Systems, IEEE Transactions on, vol.14, no.9, pp.841-850, Sept.2003
    Macia-Perez, F.; Mora-Gimeno, F.; Marcos-Jorquera, D.; Gil-Martinez-Abarca, J.A.; Ramos-Morillo, H.; Lorenzo-Fonseca, I.;, "Network Intrusion Detection System Embedded on a Smart Sensor," Industrial Electronics, IEEE Transactions on, vol.58, no.3, pp.722-732, March 2011
    Das, A.; Nguyen, D.; Zambreno, J.; Memik, G.; Choudhary, A.;, "An FPGA-Based Network Intrusion Detection Architecture," Information Forensics and Security, IEEE Transactions on, vol.3, no.1, pp.118-132, March 2008
    Bo Sun; Osborne, L.; Yang Xiao; Guizani, S.;, "Intrusion detection techniques in mobile ad hoc and wireless sensor networks," Wireless Communications, IEEE, vol.14, no.5, pp.56-63, October 2007
    Weiming Hu; Wei Hu; Maybank, S.;, "AdaBoost-Based Algorithm for Network Intrusion Detection," Systems, Man, and Cybernetics, Part B:Cybernetics, IEEE Transactions on, vol.38, no.2, pp.577-583, April 2008
    Ping, Yi; Xinghao, Jiang; Yue, Wu; Ning, Liu;, "Distributed intrusion detection for mobile ad hoc networks," Systems Engineering and Electronics, Journal of, vol.19, no.4, pp.851-859, Aug.2008
    Fung, C.J.; Jie Zhang; Aib, I.; Boutaba, R.;, "Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks," Network and Service Management, IEEE Transactions on, vol.8, no.2, pp.79-91, June 2011
    Shingo Mabu; Ci Chen; Nannan Lu; Shimada, K.; Hirasawa, K.;, "An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming," Systems, Man, and Cybernetics, Part C. Applications and Reviews, IEEE Transactions on, vol.41, no.1, pp.130-139, Jan. 2011
    Chan, E.Y.K.; Chan, H.W.; Chan, K.M.; Chan, P.S.; Chanson, S.T.; Cheung, M.H.; Chong, C.F.; Chow, K.P.; Hui, A.K.T.; Hui, L.C.K.; Ip, S.K.; Lam, C.K.; Lau, W.C.; Pun, K.H.; Tsang, Y.F.; Tsang, W.W.; Tso, C.W.; Yeung, D.Y.; Yiu, S.M.; Yu, K.Y.; Weihua Ju;, "Intrusion Detection Routers:Design, Implementation and Evaluation Using an Experimental Testbed," Selected Areas in Communications, IEEE Journal on, vol.24, no.10, pp.1889-1900, Oct.2006
    White, G.B.; Fisch, E.A.; Pooch, U.W.;, "Cooperating security managers:a peer-based intrusion detection system," Network, IEEE, vol.10, no.1, pp.20-23, Jan/Feb 1996
    Foley, E.; Harman, K.; Cheal, J.;, "Improving intrusion detection radar," Aerospace and Electronic Systems Magazine, IEEE, vol.17, no.8, pp.22-27, Aug 2002
    Di He; Leung, H.;, "Network Intrusion Detection Using CFAR Abrupt-Change Detectors," Instrumentation and Measurement, IEEE Transactions on, vol.57, no.3, pp.490-497, March 2008
    Nong Ye; Qiang Chen; Borror, C.M.;, "EWMA forecast of normal system activity for computer intrusion detection," Reliability, IEEE Transactions on, vol.53, no.4, pp.557-566, Dec.2004
    Gupta, K.K.; Nath, B.; Kotagiri, R.;, "Layered Approach Using Conditional Random Fields for Intrusion Detection," Dependable and Secure Computing, IEEE Transactions on, vol.7, no.1, pp.35-49, Jan.-March 2010
    Lin Chen; Leneutre, J.;, "A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks," Information Forensics and Security, IEEE Transactions on, vol.4, no.2, pp.165-178, June 2009
    Jiankun Hu; Xinghuo Yu; Qiu, D.; Hsiao-Hwa Chen;, "A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection," Network, IEEE, vol.23, no.1, pp.42-47, January-February 2009
    Boppana, R.V.; Xu Su;, "On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks," Mobile Computing, IEEE Transactions on vol.10, no.8, pp.1162-1174, Aug.2011
    Sperotto, A.; Schaffrath, G.; Sadre, R.; Morariu, C.; Pras, A.; Stiller, B.;, "An Overview of IP Flow-Based Intrusion Detection," Communications Sun'eys& Tutorials, IEEE, vol.12, no.3, pp.343-356, Third Quarter 2010
    Mishra, A.; Nadkarni, K.; Patcha, A.;, "Intrusion detection in wireless ad hoc networks," Wireless Communications, IEEE, vol.11, no.1, pp.48-60, Feb 2004
    Chen, T.M.; Venkataramanan, V.;, "Dempster-Shafer theory for intrusion detection in ad hoc networks," Internet Computing, IEEE, vol.9, no.6, pp.35-41, Nov.-Dec. 2005
    Xinguang, Tian; Miyi, Duan; Chunlai, Sun; Wenfa, Li;, "Intrusion detection based on system calls and homogeneous Markov chains," Systems Engineering and Electronics, Journal of, vol.19, no.3, pp.598-605, June 2008
    Premaratne, U.K.; Samarabandu, J.; Sidhu, T.S.; Beresh, R.; Jian-Cheng Tan;, "An Intrusion Detection System for IEC61850 Automated Substations," Power Delivery, IEEE Transactions on, vol.25, no.4, pp.2376-2383, Oct.2010
    Tung Le; Hadjicostis, C.N.;, "Graphical Inference for Multiple Intrusion Detection," Information Forensics and Security, IEEE Transactions on, vol.3, no.3, pp.370-380, Sept.2008
    Boping, Qin; Xianwei, Zhou; Jun, Yang; Cunyi, Song;, "Grey-theory based intrusion detection model," Systems Engineering and Electronics, Journal of, vol.17, no.1, pp.230-235, March 2006
    Manikopoulos, C.; Papavassiliou, S.;, "Network intrusion and fault detection:a statistical anomaly approach," Communications Magazine, IEEE, vol.40, no.10, pp.76-82, Oct 2002
    Valeur, F.; Vigna, G.; Kruegel, C.; Kemmerer, R.A.;, "Comprehensive approach to intrusion detection alert con-elation," Dependable and Secure Computing, IEEE Transactions on, vol.1, no.3, pp.146-169, July-Sept.2004
    Samfat, D.; Molva, R.;, "IDAMN:an intrusion detection architecture for mobile networks," Selected Areas in Communications, IEEE Journal on, vol.15, no.7, pp.1373-1380, Sep 1997
    Xinidis, K..; Charitakis, I.; Antonatos, S.; Anagnostakis, K.G; Markatos, E.P.;, "An active splitter architecture for intrusion detection and prevention," Dependable and Secure Computing, IEEE Transactions on, vol.3, no.1, pp.31-44, Jan.-March 2006
    Yun Wang; Xiaodong Wang; Bin Xie; Demin Wang; Agrawal, D.P.;, "Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks," Mobile Computing, IEEE Transactions on, vol.7, no.6, pp.698-711, June 2008
    Shiuh-Pyng Shieh; Gligor, V.D.;, "On a pattern-oriented model for intrusion detection," Knowledge and Data Engineering, IEEE Transactions on, vol.9, no.4, pp.661-667, Jul/Aug 1997
    Zachary K. Baker; Viktor K. Prasanna;, "Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs," Dependable and Secure Computing, IEEE Transactions on, vol.3, no.4, pp.289-300, Oct.-Dec.2006
    Cheung, S.;, "Securing Collaborative Intrusion Detection Systems," Security & Privacy, IEEE, vol.9, no.6, pp.36-42, Nov.-Dec.2011
    Jin-Hee Cho; Ing-Ray Chen; Phu-Gui Feng;, "Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks," Reliability, IEEE Transactions on, vol.59, no.1, pp.231-241, March 2010
    Ilgun, K.; Kemmerer, R.A.; Porras, P.A.;, "State transition analysis:a rule-based intrusion detection approach," Software Engineering, IEEE Transactions on, vol.21, no.3,pp.181-199, Mar 1995
    Pin Ren; Yan Gao; Zhichun Li; Yan Chen; Watson, B.;, "IDGraphs:intrusion detection and analysis using stream compositing," Computer Graphics and Applications, IEEE, vol.26, no.2, pp.28-39, March-April 2006
    Kemmerer, R.A.; Vigna, G.;, "Intrusion detection:a brief history and overview," Computer,vol.35, no.4, pp.27-30, Apr 2002
    Pontes, E.; Guelfi, A.; Alonso, E.;, "Forecasting for Return on Security Information Investment:New Approach on Trends in Intrusion Detection and Unwanted Internet Traffic," Latin America Transactions, IEEE (Revista IEEE America Latina), vol.7, no.4, pp.438-445, Aug.2009
    Yichi Zhang; Lingfeng Wang; Weiqing Sun; Green, R.C.; Alam, M.;, "Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids," Smart Grid, IEEE Transactions on, vol.2, no.4, pp.796-808, Dec.2011
    Khanna, R.; Huaping Liu;, "Control theoretic approach to intrusion detection using a distributed hidden Markov model," Wireless Communications, IEEE, vol.15, no.4, pp.24-33, Aug.2008
    Sung-Bae Cho;, "Incorporating soft computing techniques into a probabilistic intrusion detection system," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol.32, no.2, pp.154-160, May 2002
    David J. Chaboya; Richard A. Raines; Rusty O. Baldwin; Barry E. Mullins;, "Network Intrusion Detection:Automated and Manual Methods Prone to Attack and Evasion," Security & Privacy, IEEE, vol.4, no.6, pp.36-43, Nov.-Dec.2006
    Ye, N.; Emran, S.M.; Chen, Q.; Vilbert, S.;, "Multivariate statistical analysis of audit trails for host-based intrusion detection," Computers, IEEE Transactions on, vol.51, no.7, pp.810-820, Jul 2002
    Puketza, N.; Chung, M.; Olsson, R.A.; Mukherjee, B.;, "A software platform for testing intrusion detection systems," Software, IEEE, vol.14, no.5, pp.43-51, Sep/Oct 1997
    Stone, A.;, "Natural-Language Processing for Intrusion Detection," Computer, vol.40, no.12, pp.103-105, Dec.2007
    Mohammed, N.; Otrok, H.; Lingyu Wang; Debbabi, M.; Bhattacharya, P.; "Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET," Dependable and Secure Computing, IEEE Transactions on, vol.8, no.1, pp.89-103, Jan.-Feb.2011
    Shengrong Bu; Yu, F.R.; Liu, X.P.; Tang, H.;, "Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks," Wireless Communications, IEEE Transactions on, vol.10, no.9, pp.3064-3073, September 2011
    Baker, Z.K.; Prasanna, V.K.;, "A computationally efficient engine for flexible intrusion detection," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol.13, no.10, pp.1179-1189, Oct.2005
    Tan, L.; Sherwood, T.;, "Architectures for Bit-Split String Scanning in Intrusion Detection," Micro, IEEE, vol.26, no.1, pp.110-117, Jan.-Feb.2006
    Gaspary, L.P.; Sanchez, R.N.; Antunes, D.W.; Meneghetti, E.;, "A SNMP-based platform for distributed stateful intrusion detection in enterprise networks," Selected Areas in Communications, IEEE Journal on, vol.23, no.10, pp.1973-1982, Oct.2005
    Shengrong Bu; Yu, F.R.; Liu, X.P.; Mason, P.; Tang, H.;, "Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks," Vehicular Technology, IEEE Transactions on vol.60, no.3, pp.1025-1036, March 2011
    Itoh, T.; Takakura, H.; Sawada, A.; Koyamada, K.;, "Hierarchical visualization of network intrusion detection data," Computer Graphics and Applications, IEEE, vol.26, no.2, pp.40-47, March-April 2006
    Misra, S.; Krishna, P.V.; Abraham, K.I.;, "Adaptive link-state routing and intrusion detection in wireless mesh networks," Information Security, IET, vol.4, no.4, pp.374-389, December 2010
    Nong Ye; Vilbert, S.; Qiang Chen;, "Computer intrusion detection through EWMA for autocorrelated and uncorrelated data," Reliability, IEEE Transactions on, vol.52, no.1, pp.75-82, March 2003
    Demirkol, I.; Alagoz, F.; Delic, H.; Ersoy, C.;, "Wireless sensor networks for intrusion detection:packet traffic modeling," Communications Letters, IEEE, vol.10, no.1, pp.22-24, Jan 2006
    Nash, D.A.; Ragsdale, D.J.;, "Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems," Systems, Man and Cybernetics, Part A:Systems and Humans, IEEE Transactions on, vol.31, no.4, pp.327-331, Jul 2001
    Ferreira, E.W.T.; Carrijo, G.A.; de Oliveira, R.; de Souza Araujo, N.V.;, "Intrusion Detection System with Wavelet and Neural Artifical Network Approach for Networks Computers," Latin America Transactions, IEEE (Revista IEEE America Latina), vol.9, no.5, pp.832-837, Sept.2011
    Thomas, C.; Balakrishnan, N.;, "Improvement in Intrusion Detection With Advances in Sensor Fusion," Information Forensics and Security, IEEE Transactions on, vol.4, no.3, pp.542-551, Sept.2009
    Denning, D.E.;, "An Intrusion-Detection Model," Software Engineering, IEEE Transactions on, vol.SE-13, no.2, pp.222-232, Feb.1987
    Chaboya, D.J.; Raines, R.A.; Baldwin, R.O.; Mullins, B.E.;, "Network Intrusion Detection:Automated and Manual Methods Prone to Attack and Evasion," Security & Privacy, IEEE, vol.4, no.6, pp.36-43, Nov.-Dec.2006
    Schutte, J.; Scholz, S.;, "Guideway intrusion detection," Vehicular Technology Magazine, IEEE, vol.4, no.3, pp.76-81, Sept.2009
    Puketza, N.J.; Zhang, K.; Chung, M.; Mukherjee, B.; Olsson, R.A.;, "A methodology for testing intrusion detection systems," Software Engineering, IEEE Transactions on, vol.22, no.10, pp.719-729, Oct 1996
    Tarakanov, A.O.;, "Immunocomputing for intelligent intrusion detection," Computational Intelligence Magazine, IEEE, vol.3, no.2, pp.22-30, May 2008
    Umang, S.; Reddy, B.V.R.; Hoda, M.N.;, "Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption," Communications, IET, vol.4, no.17, pp.2084-2094, November 26 2010
    Hongbin Lu; Kai Zheng; Bin Liu; Xin Zhang; Yunhao Liu;, "A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection," Selected Areas in Communications, IEEE Journal on, vol.24, no.10, pp.1793-1804, Oct.2006
    Pin-Wei Chen; Gregory Young;, "Ported coax intrusion detection sensor," Antennas and Propagation, IEEE Transactions on, vol.32, no.12, pp.1313-1317, Dec 1984
    Vieira, K.; Schulter, A.; Westphall, C.B.; Westphall, C.M.;, "Intrusion Detection for Grid and Cloud Computing," IT Professional, vol.12, no.4, pp.38-43, July-Aug. 2010
    Hegazy, I.M.; Al-Arif, T.; Fayed, Z.T.; Faheem, H.M.;, "A multi-agent based system for intrusion detection," Potentials, IEEE, vol.22, no.4, pp.28-31, Oct.-Nov. 2003
    Hyunjin Kim; Hyejeong Hong; Hong-Sik Kim; Sungho Kang;, "A memory-efficient parallel string matching for intrusion detection systems," Communications Letters, IEEE, vol.13, no.12, pp.1004-1006, December 2009
    Qiao, Y.; Xin, X.W.; Bin, Y.; Ge, S.;, "Anomaly intrusion detection method based on HMM," Electronics Letters, vol.38, no.13, pp.663-664,20 Jun 2002
    Erbacher, R.F.; Walker, K.L.; Frincke, D.A.;, "Intrusion and misuse detection in large-scale systems," Computer Graphics and Applications, IEEE, vol.22, no.l, pp.38-47, Jan/Feb 2002
    Britos, Jose Daniel;, "Statistical Intrusion Detection in Data Networks," Latin America Transactions, IEEE (Revista IEEE America Latina), vol.5, no.5, pp.373-380, Sept.2007
    Ahmed, N.; Fogler, R.J.; Soldan, D.L.; Elliott, G.R.; Bourgeois, N.A.;, "On an Intrusion-Detection Approach Via Adaptive Prediction," Aerospace and Electronic Systems, IEEE Transactions on, vol.AES-15, no.3, pp.430-438, May 1979
    Dharmapurikar, S.; Lockwood, J.W.;, "Fast and Scalable Pattern Matching for Network Intrusion Detection Systems," Selected Areas in Communications, IEEE Journal on, vol.24, no.10, pp.1781-1792, Oct.2006
    Jacoby, G.A.; Davis, N.J.;, "Mobile Host-Based intrusion Detection and Attack Identification," Wireless Communications, IEEE, vol.14, no.4, pp.53-60, August 2007
    Chen, T.; Fu, Z.; He, L.; Strayer, T.;, "Recent developments in network intrusion detection [Guest Editorial]," Network, IEEE, vol.23, no.1, pp.4-5, January-February 2009
    Soewito, B.; Vespa, L.; Mahajan, A.; Ning Weng; Haibo Wang;, "Self-addressable memory-based FSM:a scalable intrusion detection engine," Network, IEEE, vol.23, no.1, pp.14-21, January-February 2009
    Lehtinen, M.; Lear, A.C.;, "Intrusion detection:managing the risk of connectivity," IT Professional, vol.1, no.6, pp.11-13, Nov/Dec 1999
    Kosoresow, A.P.; Hofmeyer, S.A.;, "Intrusion detection via system call traces," Software, IEEE, vol.14, no.5, pp.35-42, Sep/Oct 1997
    HyunJin Kim; Hong-Sik Kim; Sungho Kang;, "A Memory-Efficient Bit-Split Parallel String Matching Using Pattern Dividing for Intrusion Detection Systems," Parallel and Distributed Systems, IEEE Transactions on, vol.22, no.11, pp.1904-1911, Nov.2011
    Hass, K.; Lenhert, D.; Ahmed, N.;, "On a microcomputer implementation of an intrusion-detection algorithm," Acoustics, Speech and Signal Processing, IEEE Transactions on, vol.27, no.6, pp.782-789, Dec 1979
    Li, X.; Sun, Q.; Wo, J.; Zhang, M.; Liu, D.;, "Hybrid TDM/WDM-Based Fiber-Optic Sensor Network for Perimeter Intrusion Detection," Lightwave Technology, Journal of, vol.30, no.8, pp.1113-1120, April 15,2012
    Weissman, Steven J.;, "A Microcomputer Based System for Intrusion Detection Display and Assessment," Nuclear Science, IEEE Transactions on, vol.29, no.l, pp.869-873, Feb.1982
    Lear, A.C.;, "Axent's rob clyde:why you need intrusion detection," IT Professional, vol.2, no.4, pp.80-79, Jul/Aug 2000
    McHugh, John; Christie, Alan; Allen, Julia;, "Defending Yourself:The Role of Intrusion Detection Systems," Software, IEEE, vol.17, no.5, pp.42-51, Sept.-Oct.2000
    Ceng, M.S.; Bonsor, N.;, "Baywatch practical automatic detection of intrusion over water," Aerospace and Electronic Systems Magazine, IEEE, vol.12, no.8, pp.30-32,Aug1997
    DENNING DE. An Intrusion Detection Model[J]. IEEE Trans on Soft Engineering. 1987,13(2):222-232.
    FORREST S, HOFMEYR SA. Immunology as Processing Design Principles for Immune Systems & Other Di8tnlbuted Autonomous systems [M]. SEGAL A, COHENIR Oxford University Press,2000.
    FORREST S, HOFMEYR SA, SOMAYAJI A. A Sense of Self for Unix process[A]. Proceeding of 1996 JEEE Symposium on Computer Security and Privacy[C]. Oak 1 and, California:IEEE Computer Society Press,1996.120-128.
    LEE W. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems[J]. PhD thesis, Columbia University 1999.
    LANE T, BRODLEY CE. Temporal Sequence leaning and Data Reduction for Anomaly Detection[J]. ACM Transactions on information and System Security, 1999,2(3):295-331.
    FORREST S, HOFMEYR SA, SOMAYAJI A. A Sense of Self for Unix process[A]. Proceeding of 1996 JEEE Symposium on Computer Security and Privacy[C]. Oak1and, California:IEEE Computer Society Press,1996.120-128.
    HOFMEYR S A, SOMAYAJI A, FORREST S. Intrusion detection using sequences of system calls [J]. Journal of Computer Security,1998,6:151-180.
    BERNASCHI M, GABRIELLIE, MANCINT L V. REMUS:a security operating system[C]. Proc ACM Trans on Information and System Security. Washington, DC:IEEE.2002.
    SURESH N C, CHENG P C. BlueBox:a policy-driven, host-bashed intrusion system[C]. Proc of the ISOC Symposium on Network and Distributed System Security. San Diego, CA:[s. n.],2002:46-50.
    WESPI A, DACIER M, DEBAR H, Intrusion detection using variable-length audit trail patterns[C]. Recent Advances Intrusion Detection. Toulon, France:[s. n],2000:110-129.
    ENDLER D. Intrusion detection:applying machine learning to Solaris audit data[C]. Proc of Annual Computer Security Application Conference. Los Alamitos, CA: IEEE Computer Security Press,1989
    WENKE L, SALVATORE J S, et al. real-time data mining based intrusion[C]. Proc of DISCEX Ⅱ. Anaheim:ACM Press,2001:15-20.
    WANGNER D, SOTO P. Mimicry attack on host-based intrusion detection system[C]//Proc of the 9th ACM conference on Computer and Communications Security. Washington, DC:IEEE,2002:50.
    Tax D M J. One-class classification. Delft University of Technology,1999.
    Rtsch G, Schlkopf B,Mika S, et al. SVM and boosting:one class. Technical Report 119. Berlin:GMD FIRST. Kekul'estr.2000.
    Manevitz L M, Yousef M. One2class SVMs for document classification. Journal of Machine Learning Research,2001, (2):1392154.
    Chen Y Q, Zhou X,Huang T S. One2class SVM for learning in image retrieval. Proc IEEE Conf on Image Processing.2001.
    Data Domain Description using Support Vectors, David M.J. Tax, Robert P.W.Duin, ESANN'1999 proceedings-European Symposium on Artificial Neural Networks,Bruges (Belgium),21-23 April 1999, D-Facto public, ISBN 2-600049-9-X, pp.251-256
    ESANN'1999 proceedings-European Symposium on Artificial Neural Networks Bruges (Belgium),21-23 April 1999, D-Facto public, ISBN 2-600049-9-X, pp. 251-256
    Yeung, D.Y., Chow, C.:Parzen-window network intrusion detectors. In:Proc. Of the Sixteenth International Conference on Pattern Recognition. (2002) 385-388
    D. M. J. Tax and R. P. W. Duin. Combining one-class classifiers. In Multiple Classifier Systems (MCS),2001.
    A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques, Thomas Stiborl, Jonathan Timmis2, and Claudia Eckert1, et al. (Eds.):ICARIS 2005, LNCS 3627, pp.262-275,2005.
    Rich E., Artificial Intelligence. McGraw-Hill, Inc.,1983.
    Turing A., Computing machinery and intelligence. MIND,1950,59:433-460.
    Frank Rosenlatt. The perception:A probabilistic model for information storage and organization in the brain. Psychological Review,65(6):386-408,1958.
    Frank Rosenblatt. Principles of Neurodynamics:Perceptron and theory of brain mechanisms. Spartan Books, Washington DC,1962.
    V. Vapnik. An overview of statistical learning theory. IEEE Trans. Neural Networks, vol.10, no.5, pp.988-999,1999.
    V. Vapnik. The Nature of statistical learning Theory. New York:Spinger-Verlag,1995.
    V. Vapnik. Statistical Learning Theory. Wiley-Interscience Publication.1998.
    Weinert, H.L. Reproducing Kernel Hilbert Space. Hutchinson Ross, Sroudsburg. PA. 1982.
    Wahba, G. Spline Models for Observational Data, vol.59 if CBMS-NSF Regional Conference Series in Applied Mathematics. SIAM, Philadelphia,1990.
    Vapnik, V.N., Chervonenkis, A.Ja. On the uniform convergence of relative frequencies of events to their probabilities. Doklady Akademii Nauk USSR,181(4),1968. (English transl. Sov. Math. Dokl.)
    Vapnik, V.N., Chervonenkis, A.Ja. Theory of Pattern Recoginition (in Russian), Nauka, Moscow,1974.
    Cortes, C., Vapnik, V. Support Vector Networks. Machine Learning,20:1-25,1995.
    Scholkopf, B., Burges, C., and Vapnik, V. Extracting support data for a given task. In U. M. Fayyad and R. Uthurusamy, editor, Proceedings, First International Conference on Knowledge Discovery & Data Mining. AAAI Press, Menlo Park, CA,1995.
    Blanz, V., Scholkopf, B., Bulthoff, H., Burges, C., Vapnik, V., and Vetter, T. Comparison of view-based object recognition algorithms using realistic 3d models. In C. von der Malsburg, W.von Seelen, J. C. Vorbriiggen, and B. Sendhoff, editors, Artificial Neural Netwoks—ICANN'96, pp.251-256, Berlin, 1996. Springer Lecture Notes in Computer Science, Vol.1112.
    Schomidt, M. Identifying speaker with support vector networks. In Interface'96 Proceedings, Sydney,1996.
    Osuna, E., Freund, R., Girosi, G. Training support vector machines:an application to face detection. In International Conference on Computer Vision and Pattern Recognition, pp.130-136,1997.
    Joachims, T. Text categorization with support vector machines. Technical report LS VIII Number 23, University of Dortmund,1997.
    Qing Li, Licheng Jiao. Adaptive Simplification of Solution for Support Vector Machine. Pattern Recognition,2006.
    Boser, B. E., Guyon, I.M., Vapnik, V.N. A training algorithm for optimal margin classifiers. In D. Haussler, editor, Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory, Pittsburgh, PA:ACM Press, pp. 144-152,1992.
    Osuna, E., Freund, R., Girosi, G. Improved training algorithm for support vector machines. Proc. IEEE NNSP'97. Amelia Island, pp.24-26,1997.
    Joachims, T. Making large-scale SVM learning practical. In B. Scholkopf, C. J. C. Burges, and A. J. Smola, edtors, Advances in Kernel Methods—Support Vector Learning, Cambridge, MA:MIT Press, pp.169-184,1999.
    Platt, J. Fast training of support vector machines using sequential minimal optimization. In B. Scholkopf, C. J. C. Burges, and A. J. Smola, edtors, Advances in Kernel Methods—Support Vector Learning, Pages 185-208, Cambridge, MA:MIT Press,1999.
    J.Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania,1980
    D.Denning. An Intrusion Detection Model. IEEE Transactions on Software Engineering,1987, SE-13(2):222-232
    S. Forrest. A. Elson, R. Cherukuri. Self Non—self Discrimination in a Computer. Proceedings of 1994 IEEE Computer Society Symposium 011 Research in Security and Privacy,1994,202-212
    P.D'Haeseleer, S. Forrest, P. Helman. An Immunological Approach to Change Detection:Theoretical Results. Proceedings of the 9th IEEE Computer Security Foundations Workshop,1996,18-27
    F.Gonzalcz. A Study of Artificial Immune Systems Applied to Anomaly Detection: [PhD Thesis]. Difision of Computer Science, University of Memphis,2003
    Z.Ji and Dasgupta, Revisiting Negative Selection Algorithms. Evolutionary Computation Journal,2007,15(2):223-251
    U.Aickelin, P.Bentley, S.Cayzer,et al. Danger Theory:The Link between AIS and IDS? Proceeding of Second International Conference on Artificial Immune Systems(ICARIS),2003,147.155
    E.Matzinger. Tolerance Danger and the Extended Family[J]. Annual reviews of Immunology 1994,12991-1045
    P.Bentley, J.Greensmith, S.Ujin. Two Ways to Grow Tissue for Artificial Immune Systems. Proceeding of the Fourth International Conference on Artificial Immune Systems(lCARIS) 2005,139-152
    J. Kiln, J. Greensmith, J. Twycross. et al. Malicious Code Execution Detection and Response Immune System Inspired by the Danger Theory. Adaptive and Resilient Computing Security Workshop(ARCS-05),2005
    P. Matzinger. The Danger Model:A Renewed Sense of Self Science,2002, 296:301-305
    P. Matzinger. Tolerance, Danger, and the Extended Family. Annual Review of Immunology,1994,12:991-1045
    M.Bishop. Computer Security. Art and Science. Beijing:Tsinghua University Press, 2004
    J. Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania,1980
    D. Denning. An Intrusion Detection Model. IEEE Transactions on Software Engineering,1987, SE-13(2):222-232
    S. Hofmeyr. An Immunological Model of Distributed Detection and Its Application to Computer Security:[PhD Thesis]. University Of New Mexico,1999
    D. Anderson, T. Frivold, A. Valdes. Next-generation Intrusion Detection Expert System (NIDES):A Summary. Technical Report SRL-CSL-95-07, Computer Science Laboratory, SRI International,1995
    J. Kephart. A Biologically Inspired Immune System for Computers. Proceedings of the Fourth International Workshop on Synthesis and Simulation of Living Systems, Artificial Life Iv,1994,130-139
    F. S. de Paula, L. N. de Castro, P. L. de Geus. An Intrusion Detection System Using Ideas from the Immune System. Proceeding of IEEE Congress on Evolutionary Computation(CEC.2004),2004,1059-1066
    A. Somayaji, S. Hofmeyr, S. Forrest. Principles of a Computer Immune System. Proceeding of New Security Workshop,1997,75-82
    P. Matzinger. Tolerance, Danger, and the Extended Family. Annual Review of Immunology,1994,12:991-1045
    Y Melnikov, A. O. Tarakanov. Immune computing Model of Intrusion Detection. Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2003),2003,453-456
    J. Kim, P. Bentley, U. Aickelin, et al. Immune System Approaches to Intrusion Detection. A Review. Natural Computing,2007,6(4):413-466
    D. Dasgupta. Immunity-based Intrusion Detection Systems:A General Framework. Proceeding of the 22nd National Information Systems Security Conference(NISSC),1999
    S. Forrest, A. Elson, R. Cherukuri. Self Non—self Discrimination in a Computer. Proceedings of 1994 IEEE Computer Society Symposium 011 Research in Security and Privacy,1994,202-212
    P. D haeseleer, S. Forrest, P. Helman. An Immunological Approach to Change Detection:Theoretical Results. Proceedings of the 9th IEEE Computer Security Foundations Workshop,1996,18-27
    S. Hofineyr, S. Forrest. Immunity by Design:An Artificial Immune System. Proceedings of the Genetic and Evolutionary Computation Conference 1999(GECCO),1999,1289-1296
    S. Hofmeyr, S. Forrest. Architecture for an Artificial Immune System. Evolutionary Computation Journal,2000,8(4):443-473
    M. Glickman, J. Balthrop, S.Forrest. A Machine learning Evaluation of an Artificial Immune System. Evolutionary Computation Journal,2005,13(2):179-212
    J.Kim, P.Bentley. Towards an Artificial Immune System for Network Intrusion Detection:An Investigation of Dynamic Clonal Selection[A]. The Congress on Evolutionary Computation(CEC-2002)[C]. Washington D. C.:IEEE Press, 2002,1015-1020
    J. Kim, P.Bentley. An Artificial Immune Model for Network Intrusion Detection, 7th European congress on intelligent techniques and soft computing(EUFIT' 99),1999[EB/OL]. http://www.cs.plu.edu/pub/faeulty/sp-illman/seniorprojarts/ids/immune3.pdf
    E.J. Anderson. Computer Security Threat Monitoring and Surveillance. Technical Report, James P. Anderson Co.. Fort Washington, PA, April 1980.
    U. Aickelin and S. Cayzer. The Danger Theory and Its Application to Artificial Immune Systems. In Proc. of the 1st International Conference on Artificial Immune Systems, pages 141-148, Canterbury, Kent,2002.
    U.Aickelin, P.Bentley, S.Cayzer, J. W. Kim, and J. McLeod. Danger Theory:The Link between AIS and IDS. In Proc. of the 2nd International Conference on Artificial Immune Systems, LNCS 2787, pages 147-155, Edinburgh, U.K.,2003.
    Linux Trace Toolkit (LTT) homepage. http://www.opersys.com/LTT/,2007.
    N.Athanasiades, R.Abler, J. Levine, H. Owen, and G. Riley. Intrusion Detection Testing and Benchmarking Methodologies. In Proc. of the 1st IEEE International Workshop on Information Assurance, pages 63-72, March 2003.
    Strace homepage, http://sourceforge.net/projects/strace/,2007.
    W.D.Sun, Z.Tang, H.Tamura, and M.Ishii. An artificial immune system architecture and its applications. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E86-A(7):1858-1868,2003.
    M.Swimmer. Using the danger model of immune systems for distributed defense in modern data networks. Computer Networks,51 (5):1315—1333,2007.
    SCTP homepage, http://www.sctp.net.
    P. K Harmer, P. D. Williams, Q H. Gunsch, et al. An Artificial Immune System Architecture for Computer Security Applications. IEEE Transactions on Evolutionary Computation,2002,6(3):252-280
    G. B. Lamont, R. E. Marmelstein, D.A. Van Veldhuizen. A Distributed Architecture for a Self-Adaptive Computer Virus Immune System. New Ideas in Optimization, Advanced Topics in Computer Science Series,1999,167-183
    J. Kim. Integrating Artificial Immune Algorithms for Intrusion Detection.'[PhD Thesis]. Department of Computer Science, University College London,2002
    J.Kim, P. Bentley. Towards all Artificial Immune System for Network Intrusion Detection:An Investigation of Dynamic Clonal Selection. Proceedings of Congress on Evolutionary Computation,2002,1015-1020
    J. Kim, P. Bentley. Immune Memory and Gene Library Evolution in the Dynamical Clonal Selection Algorithm. Journal of Genetic Programming and Evolvable Machines,2004,5(4):361-391
    M. Ayara, J. Timmis, R. de Lomos, et al. Negative Selection:How to Generate Detectors. Proceedings of the First International Conference on Artificial Immune Systems (ICARIS),2002,89-98
    R. Deaton, M. Garzon, J. A. Rose, R. C. Murphy, S. E. Stevens, D. R. Franceschetti. DNA Based Artificial immune System for Self-Nonself Discrimination. Proceedings of the 1997 IEEE International Conference on System, Orlando, Florida.1997.
    J. Kim, P. Bentley. Evaluating Negative Selection in all Artificial Immune System for Network Intrusion Detection. Proceedings of the Genetic and Evolutionary Computation Conference 2001(GECCO),2001,1330-1337
    U. Aickelin, P. Bentley, S. Cayzer, et al. Danger Theory:The Link between AIS and IDS Proceeding of Second International Conference on Artificial Immune Systems(ICARIS),2003,147-155
    P. Bentley, J. Greensmith, S. Win. Two Ways to Grow Tissue for Artificial Immune Systems. Proceeding of the Fourth International Conference on Artificial Immune Systems(ICARIS),2005,139-152
    J. Greensmith, U. Aickelin, S. Cayzer. Introducing Dendritic Cells as a Novel Immune Inspired Algorithm for Anomaly Detection. Proceeding of the Fourth International Conference on Artificial Immune Systems(ICARIS),2005, 153—167
    J. Kiln, J. Greensmith, J. Twycross, et al. Malicious Code Execution Detection and Response Immune System Inspired by the Danger Theory. Adaptive and Resilient Computing Security Workshop (ARCS-05),2005
    S. Balachandran. Multi—shaped Detector Generation Using Real-valued Representation for Anomaly Detection:[Masters Thesis]. University of Memphis, Memphis, TN, US,2005
    D. Dasgupta, E Gonzalez. An Immunity-Based Technique to Characterize Intrusions in Computer Networks. Special Issue on Artificial Immune Systems of the Journal IEEE Transactions on Evolutionary Computation,2002,6 (3): 281-29185
    U. Aickelin, S. Cayzer. The Danger Theory and Its Application to Artificial Immune Systems. Proceedings of First International Conference on Artificial Immune Systems(ICARIS),2002,141-148
    T. Stibor, J. Timmis, C. Eckert. On the Appropriateness of Negative Selection Defined over Hamming Shape-Space as Network Intrusion Detection System. Evolutionary Computation,2005,995-1002
    T. Stibor, P. Mohr, J. Timmis. Is Negative Selection Appropriate for Anomaly Detection? Proceedings of the Genetic and Evolutionary Computation Conference 2005(GECCO),2005,321-328

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700