人工免疫系统的混沌机制及在网络入侵检测中的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机网络应用规模的日益扩大,计算机网络安全隐患变得越来越突出。如何设计安全措施来防范未经授权的数据访问和非法的资源利用,是当前网络安全领域一个十分重要而迫切的问题。我们无法完全防止入侵,只能在系统受到攻击的时候,能够尽快检测出该入侵。
     生物免疫系统是生物体内结构最为复杂、功能最为独特的系统。它旨在区分外部有害抗原和自身组织,从而清除病原并保持有机体的稳定。从计算的角度来看,生物免疫系统是一个高度并行、分布、自适应和自组织的系统,由许多执行免疫功能的器官、组织、细胞和分子等组成,其主要作用是能够辨别“自己”与“异己”物质,对之作出精确应答,具有很强的学习、识别、记忆和特征提取能力。
     生物免疫系统给了我们很大的灵感,计算机的安全问题与生物免疫系统所遇到的问题具有惊人的相似性,两者都要在不断变化的环境中维持系统的稳定性。计算机面临的威胁与危险,如对保密性、完整性和可用性的侵犯,都可能由内部和外部的部件故障或者入侵行为引起。
     我们发现生物体安全与计算机安全有着许多相似之处,其中包括:分布性、多样性、适应性、自治性、动态特征、异常检测、多层次、通过行为识别身份、不完全检测等等。保护计算机免遭有害病毒等的破坏,可以看作是区分如合法
Along with the scale of network application expanding, the trouble of computer security is standed up. It is an important and urgent that how to design a safety precautious to keep unauthorized data and resource away. We can not prevent intrusions completely, but can check the intrusions as soon as possible.
     Biological immune system is the most complex and most especially in organism. It aims at to deffetent exterior antigen from self tissue, cleans the pathogeny up, and maintains the stabilization of organism. From calculating point of view, the Biological immune system can be regards as a parallel, distributed, self-adapt and self-organised system with the character of study, identify, memory and character distilling.
     The natural immune system gives us a great of inspiration. The roblems of computer security and those of natural immune system are very similar. They both need maintain the stability of system in variational enviromment.
     There are many similar points between security of organism and that of computer. For example: distributed, diversity, adaptability, self-government, dynamic, multilayer, identify by action, imperfected detection and so on. To detect the
引文
[1] 段云所,魏仕民,唐礼勇等. 信息安全概述. 北京:高等教育出版社,2003.9.
    [2] 卿斯汉,蒋建春. 网络攻防技术原理与实战[M]. 北京:科学出版社. 2004:30-107
    [3] Denning D E .An Intrusion-Detection Model [A]. IEEE Symp on Security & Privacy[C] ,1986.118-131
    [4] Anderson J P. Computer security threat monitoring and surveillance [P] . PA 19034,USA, 1980.4
    [5] Brian Caswell, Jay Beale, James C. Foster, Jeffrey Posluns. Snort 2.0 Intrusion Detection. 北京:国防工业出版社,2004.1
    [6] 唐正军. 入侵检测技术导论. 北京:机械工业出版社,2004.4
    [7] 张杰,戴英侠,入侵检测系统技术现状及其发展趋势[J],计算机与通信,2002.6:28-32
    [8] J.D. Farmer, N.H. Packard, and A. Perelson. The Immune System, Adaption, and Machine Learning. Physica D, 1986,22:187-204.
    [9] S. Forrest, A. S. Perelson. Genetic algorithms and the immune system. In H. Schwefel and R. Maenner, editors, Parallel Problem Solving from Nature, Berlin,1991.
    [10] S. Forrest, S. Hofmeyr. Computer Immunology. Communications of the ACM, 1997,40(10):88-96.
    [11] S. Hofmeyr, S. Forrest. Arichitecture for an Artificial Immune System. Evolutionary Computation Journal, 1999,7(1):45-68.
    [12] G.W.Hoffmann, An Neural Network Model Based on the Analogy with the Immune System, Eur. J. Immunol, 1986,5:638-647
    [13] Varela F.J., Stewart J. Dynamics of a Class of Immune Network, Global Stability of Idiotype Interactions, J. theoretical Biology, 1990,144
    [14] S.Forrest, A.S.Perelson, L.Allen, R.Cherukuri. Self-Nonself Discrimination in a Computer. Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland. 1994.5
    [15] J. Hunt, J. Timmis, D. Cooke, M. Neal, C. King. Jisys: the development of an artificial immune System for real world applications. Springer-Verlag. 1999
    [16] R.Deaton, M.Garzon, J.A.Rose, R.C.Murphy, S.E.Stevens, D.R.Franceschetti. DNA Based Artificial immune System for Self-Nonself Discrimination. Proceedings of the 1997 IEEE International Conference on System, Orlando, Florida. 1997.8
    [17] Z.Tang, Yamaguchi T, Tashima K et al. Multiple-valued Immune Network Model and Its Simualtions. In:Proc 27th Int Symposium on Multiple-valued Logic. Autigonish, Canada, 1997. 233-238
    [18] 肖人彬,王磊. 人工免疫系统:原理,模型,分析及展望. 计算机学报.2002.2
    [19] 钟将,吴中福,吴开贵,欧灵. 基于人工免疫网络的动态聚类算法. 电子学报,2004.8
    [20] 丁菊玲,刘晓洁,李涛等. 基于人工免疫的网络入侵动态取证. 四川大学学报(工程科学版),2004.9
    [21] 莫宏伟,吕淑萍,管凤旭. 基于人工免疫系统的数据挖掘技术原理与应用[J]. 计算机工程与应用 2004.14 :28-33
    [22] 梁可心,李涛,刘勇,陈桓. 一种基于人工免疫理论的新型入侵检测模型. 计算机工程与应用, 2005.02
    [23] 王益丰,李涛,胡晓勤,宋程. 一种基于人工免疫的网络安全实时风险检测方法. 电子学报, 2005.05
    [24] T. Y. Li and J. A. Yorke. Period three implies chaos. Amer: Math. Monthly, Vol.82, No. 10, pp. 985-992, 1975.
    [25] Chen G, Lai D. Feedback anticontrol of discrete chaos[J]. Int J of Bifurcation and Chaos, 1998,8(7):1585-1590.
    [26] Wang X F, Chen G. On feedback anticontrol of discrete chaos[J].Int J of Biurcation and Chaos, 1998,8(7):1435-1441.
    [27] 陆益民,毛宗源,张波. 基于免疫算法的混沌多模型微扰控制. 控制理论与应用,2004.2
    [28] 王智良,张化光,刘德荣. 模糊双曲模型的混沌反控制. 控制与决策,2004.9
    [29] 王孙安,郭子龙. 混沌免疫模糊聚类算法在图像边缘检测中的应用. 西安交通大学学报,2004.7
    [30] 王宏霞,何晨,丁科. 基于混沌映射的鲁棒性公开水印. 软件学报,2004.8
    [31] 何国光,曹志彤,陈宏平. 混沌神经网络的信息搜索,2002.7
    [32] 高晓明. 医学免疫学基础[M]. 北京:北京医科大学出版社,2001.11
    [33] 陈慰峰. 医学免疫学. 北京:人民出版社,2001
    [34] 李涛. 计算机免疫学[M]. 北京:电子工业出版社,2004.7
    [35] 莫宏伟. 人工免疫系统原理和应用. 哈尔滨工业大学出版社,2002
    [36] De Castro, Von Zuben. Artificial Immune System: Part I- Basic Theory And Applications.[EB/OL] ftp://ftp.dca.fee.unicamp.br/pub /docs/vonzuben/lnunes/trdca0199.pdf
    [37] De Castro, Von Zuben. Artificial Immune System: Part II-a Survey of Applications.[EB/OL] ftp://ftp.dca.fee.unicamp.br/pub/docs/ vonzuben/lnunes/rtdca0200.pdf
    [38] Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch and Gary B. Lamont. An Artificial Immune System Architecture for Computer Security Applications. IEEE Transaction on Evolutionary Computation, VOL. 6, NO. 3, JUNE 2002.
    [39] Jungwon kim, Peter Bentley. The Artificial Immune Model for Network Intrusion Detection[C]. In: 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT’99),1999
    [39] De Castro, Fernando J, Von Zuben. AiNet: An Artificial Immune Network Clustering. Data Analysis. International Journal of Computation Intelligence and Applications(IJCIA), vol.1(3),2001
    [40] De Castro, Von Zuben. An Evolutionary Immune Network for Data Clustering. Proceedings of the IEEE SBRN’00 (Brazilian Symposium on Artificial Neural Networks), Rio de Janeiro, Brazil, 2000
    [41] Jerne N K. Towards a Network Theory of the Immune System. Annual Immunology, vol,125c,1974
    [42] Sathyanath Srividhya, Sahin Ferat. AISIMAM- An Artificial immune system based intelligent multi agent model and its application to a mine detection problem. Proceedings of the 1st International Conference on Artificial Immune Systems(ICARIS2002),Kent, United Kingdom, 2002
    [43] Dipankar Dasgupta. An Artificial Immune System as a Multi-Agent Decision Support System. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics(SMC), San Diego, 1998.8
    [44] P Ballet, J Tisseau, F Harroue. A Multi-agent system to model a human humoral response. In the proceedings of the 1997 IEEE International Conference on Systems, Orlando, Florida, 1997.8
    [45] Paul K Harmer, Gary B Lamont. An Agent Based Architecture for a Computer Virus Immune System. Proceedings of the Genetic and Evolutionary Computation Conference, Orlando, Florida, USA,1999
    [46] N Foukia, D Billard, Pr J Harms. Computer System Immunity using Mobile Agents. 8th HP OpenView University Association WS(HPOVUA’2001), Berlin, Germany, 2001.6
    [47] 张楠,张建华,吴兵,等. 一种改进的计算机免疫模型.西南民族大学学报(自然科学版), 2005.2
    [48] 张化光,王智良,黄玮. 混沌系统的控制理论[M]. 沈阳:东北大学出版社,2003.9
    [49] Devaney, An Introduction to chaotic dynamical system, 2nd ed, Addison-Wesley Pub. Com. INC,1989
    [50] Heinx O P. Chaos and Fractals. Newyork: Springer Verlag,1992
    [51] Henon M.A Two-Dimensional Mapping with a Strange Attractor[J].Commun Math Phys,1978,50:69~77
    [52] Lorenz, E.N. Deterministic nonperiodic flow. J.Atoms. Sci., 20,130-141,1963
    [53] Sparrow, C. The Lorenz Equatipns: Bifurcation, Chaos and Strange Attractor, Springer-Verlag, New york, 1982
    [54] Chen G, X Dong. From Chaos to Order: Methodologies, Perspectives and Applications. World Scientific Pub. Co. Singapore 1998
    [55] Chen G, T Ueta. Yet another chaotic attractor. Int J of Bifurcation Chaos. 1999.9:1465-1466
    [56] ueta T, G Chen. Bifurcation analysis of Chen’s equation. Int J of Bifurcation Chaos. 2000.10:1917-1931
    [57] 漆安慎, 杜婵英. 免疫的非线性模型. 上海: 上海科技教育出版社, 1998.
    [58] 张楠,李志蜀,张建华,李奇. 基于混沌理论的免疫遗传算法. 计算机应用, 2006.5
    [59] 张楠,李志蜀,张建华. 基于混沌理论的否定选择算法. 四川大学学报(工程版),2006.1
    [60] Kim.J and Bentley.P. Negative selection and nicking by an artificial immune system for network intrusion detection[C]. In Proc. Of GECCO’99, 1999:149-158.
    [61] L.N De Castro, J. Timmis. Artificial Immune System: A Novel Computational Intelligence Approach [M]. London: Apinger, 2002.9
    [62] 杨向荣,沈钧毅,刘强. 基于人工免疫的 NIDS 系统和有关算法设计[J]. 小型微型计算机系统. 2004.25(3):380-383
    [63] P D’haeseleer, S Forrest. An Innunological Approach to Change Detection: Algorithm Analysis and Implication. In Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1996
    [64] L N Castro, J Timmis. Atificial Immune System: A Novel Computational Intelligence Approach. Springer-Verlag, 2002
    [65] 云庆夏. 进化算法. 北京: 冶金工业出版社, 2000.
    [66] 王磊, 焦李成, 刘芳, 等, “免疫进化子波网络及其学习算法,” 电子学报, vol. 29, no. 12A, pp. 1878-1885, 2001.
    [67] 郭子龙, 王孙安. “三种混沌免疫优化组合算法性能之比较研究,” 系统仿真学报, vol. 17, no. 2, pp. 307-309, 2005.
    [68] 王宏霞,何晨,丁科. 基于混沌映射的鲁棒性公开水印[J]. 软件学报. 2004.15(8):1245-1250
    [69] Denning. D. An Intrusion-Detection Model. IEEE Transactions on Software Engineering, Vol. Se-13, No. 2, pp 222-232, 1987.2
    [70] Mukherjee, Heberlein. L, and Levitt. K. Network Intrusion Detection. IEEE Network Magazine, Vol 8, No 3, pp 26-41, 1994.5
    [71] 赵新辉,李祥. 捕获网络数据包的方法[J]. 计算机应用研究, 2004.8, pp:242-245
    [72] 庄春兴, 杨晓伟, 黄向前. 网络数据包的捕获、分析与应用[J]. 计算机应用与软件, 2003.11, pp:68-70
    [73] 张大兴. 网络数据包分析系统的设计[J]. 计算机工程, 2001.10, pp:192-193
    [74] 张楠,李志蜀,张建华. 基于 ActiveX 技术的通用网络检测控件.计算机应用, 2005.8
    [75] David J.Kruglinski. 潘爱民,王国印译. VISUAL C++技术内幕[M]. 第四版, 北京:清华大学出版社, 2001:467-502
    [76] 张楠,张建华,李志蜀,何蔚林. 基于 ActiveX 技术的通用网络数据包发生器.西南交通大学学报(自然科学版), 2006.1
    [77] 殷肖川,刘志宏,姬伟辉等. 网络编程与开发技术[M]. 西安:西安交通大学出版社. 2003:172-273
    [78] 汪晓平,钟军. Visual C++网络通信协议分析与应用实现[M]. 北京:人民邮电出版社. 2003:1-603
    [79] 张楠,李志蜀,张建华,李奇. 面向数据链路层的网络嗅探器的开发与实现.计算机应用, 2005.5,
    [80] Kakman RE, Bucy RS. New Result in Linear Filtering and PredictionsTheory[J]. Trans. ASME, Series D, 1961,83
    [81] Durant-Whyte, Et al. Toward a Fully Decentralized Architecture for Muti-sensor Data Fusion. Pro. Of IEEE Int. Conf. on Robotics and Automations, 1990, 1331-1336
    [82] Shafer Ga. A Mathematical Theory of Evidence. Princeton Univ; press, 1976
    [83] 张楠,李志蜀,张建华,李奇. 基于免疫融合的分布式入侵检测技术.计算机工程与应用, 2005.17
    [84] 姚羽,高福祥,于戈. 基于混沌神经元的延时滥用入侵检测模型[J]. 电子学报. 2004.32(8):1370-1373
    [85] 肖人彬,王磊. 人工免疫系统:原理,模型,分析及展望. 计算机学报.2002.2
    [86] 陆益民,毛宗源,张波. 基于免疫算法的混沌多模型微扰控制. 控制理论与应用,2004.2
    [87] 马红光,韩崇昭,王国华等. 基于混沌和数据挖掘的电子系统故障诊断[J]. 数据采集与处理,2004.9:273-277
    [88] 王孙安,郭子龙. 混沌免疫模糊聚类算法在图像边缘检测中的应用. 西安交通大学学报,2004.7
    [89] 于善谦,王洪梅,朱乃硕等. 免疫学导论[M].北京:高等教育出版社,施普林格出版社,1999
    [90] 张彦超,阙喜荣,王文东,一种基于免疫原理的网络入侵检测模型[J]. 计算机工程与应用,2002,38(10):159-169.
    [91] 杨孔雨,王秀峰,入侵检测免疫模型中抗体基因库的生成和进化. 计算机应用,2003,7:26-28
    [92] Dipankar Dasgupta. Immunity-Based Intrusion Detection System: A General Framework. 22nd National Information Security Conference, 1999
    [93] 李德毅,刘常昱,杜鹢等. 不确定性人式智能[J]. 软件学报,2004. 15(11) :1583-1594
    [94] T.Kapitaniak, Chaos in Systems with Noise. Word sctentific,Singapore, 1990
    [95] M.Marek, I.Schreiber. Chaotic Behabiour of Deterministic Dissipative Systems. Cambridge university Press, 1991
    [96] A.V.holden. Chaos. Machester University Press, 1986
    [97] 肖方红,阎桂荣,韩宇航. 混沌时序相空间重构参数确定的信息论方法[J]. 物理学报,2005.54(2):550-556
    [98] 刘东林,帅典勋,吴晓江. 基于相空间重构的计算机网络的动力学特性分析[J]. 计算机工程与应用,2001.21:57-59
    [99] 宫新保,周希朗,胡光锐. 基于免疫进化算法的径向基函数网络[J]. 上海交通大学学报,2003.10:1641-1644
    [100] 刘静,钟伟才. 免疫进化聚类算法[J]. 电子学报,2001.29(12):1868-1869
    [101] Chen G, Lai D. Feedback anticontrol of discrete chaos[J]. int J of Bifurcation and Chaos,1998.8(7): 1585-1590
    [102] Asacgi M, Aihara K. Associative dynamics in a chaotic neural network[J]. Neural Netwoeks,1997.10(1): 83-98
    [103] Wang B Y, Nie J N, He z y. A transiently chaitic neural network implementation of the CDMA multiuser detector[J]. IEEE Transactions on Neural Networks, 1999.10(9): 1673-1690
    [104] Hubetman B A, Lumer E. Dynamics of adaptive system[J]. IEEE Transactions on Circuits and Systems I. 1990.37(4):547-550
    [105] T Hrycej. Identifying chaotic attractors with neural networks. Proceedings of IEEE International Conferene on Neural Network, 1995.5: 2664-2668
    [106] J H Holland. Adaptation in natural and artificial systems. Ann Arbor: The University of Michigan Press,1975
    [107] D Dasgupta, S Forrest. Artificial Immune Systems and Their Applications[M]. Berlin Heidelberg:Springer-erlag,1998
    [108] S Forrest, B Javornik, R E Smith et al. using genetic algorithms to expore pattern recognition in the immune system[J].Evolutionary Computation,1993(3):191-211
    [109] 彭京,唐常杰,李川等. M-GEP:基于多层染色体基因表达式编程的遗传进化算法[J]. 计算机学报, 2005.09 :1459-1466
    [110] 元昌安,唐常杰,温远光等. 基于基因表达式编程的智能模型库系统的实现[J]. 四川大学学报(工程科学版), 2005.03 :99-104
    [111] 谢方军,唐常杰,元昌安等. 基于流数据分类和分形维分析的 DoS 攻击检测[J]. 四川大学学报(工程科学版), 2004.06 : 87-92
    [112] 仰石,李涛,丁菊玲. 基于 Multi-agent 的计算机动态取证[J]. 计算机工程, 2005.01
    [113] 刘勇,李涛,梁可心. 基于动态克隆选择的入侵检测模型[J]. 计算机工程, 2005.11 :149-150
    [114] 刘怡光,游志胜,曹丽萍等. 一种计算矩阵特征值特征向量的神经网络方法[J]. 软件学报, 2005.6 : 1064-1072
    [115] 舒红平,游志胜,蒋建民. 基于信息熵的决策属性分类挖掘算法及应用[J]. 计算机工程与应用, 2004.01 : 186-189
    [116] 徐慧,刘凤玉. 多特征融合的入侵检测[J]. 计算机工程,2004.15(30) :103-105
    [117] 张凤斌,杨永田. 基于人工免疫原理的入侵检测技术的研究[J]. 电机与控制学报,2004.2(8):183-186
    [118] 尤勇,王孙安,盛万兴. 新型混沌优化方法的研究及应用[J]. 西安交通大学学报,2003.1:69-72
    [119] 王一清,黄惟一,宋爱国. 基于混沌搜索策略进行空洞探测的进化算法[J]. 数据采集与处理,2004.3:87-71
    [120] 王粉花,王莉,孙一康. 基于 MSE 的神经网络优化设计方法在板厚板型控制中的应用[J]. 小型微型计算机系统,2004.12(25):2264-2267

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700