主机免疫系统模型及其检测器生成算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
人工免疫系统作为计算智能研究的新领域,具备强大的信息处理和问题求解能力,在计算机安全领域得到了广泛应用,基于免疫的动态防护技术克服了传统安全技术的一些弱点,具有广阔的应用前景。
     本文借鉴人工免疫系统理论,结合主机系统的安全需求,提出了一个主机免疫系统模型,并给出了模型的形式化描述,设计了模型的结构框架,讨论了模型的免疫仿生机制和工作流程,分析了模型的重要特性;自适应性、动态防护性、可扩展性和鲁棒性。依此模型,构建了主机免疫系统体系结构,实现了基于Windows2000的主机免疫原型系统,该原型系统具备文件免疫、进程免疫和网络接口免疫等功能,构成主机全方位的免疫防护体系。然后,研究了主机免疫系统模型中检测器的生成方法,剖析了穷举等现有检测器生成算法,提出了一种自体变异的检测器生成算法,阐述了算法的实现过程——由保留一定数量空位的变异自体生成检测器,从理论上分析了该算法的性能和复杂性,结果表明,该算法克服了现有算法检测器生成效率低的不足。最后,对该算法进行了仿真实验,验证了理论分析的结果。
     总之,本文提出的模型为全面解决主机安全问题提供了新的思路,提出的算法性能优于穷举等现有检测器生成算法,具有良好的实用价值。
As a novel branch of computational intelligence, Artificial Immune System (AIS) has strong capabilities of information processing and problem-solving paradigm. AIS have been applied broadly in the field of computer security. The dynamic defending technology based on immunity has conquered many weaknesses of traditional network security technology, and there is a wider prospect of its application.
     Firstly, a host immune system model (HISM) is presented by drawing inspiration from theories of AIS and combining the host security requirements, and HISM is formally described. The framework of HISM is designed, the immune mechanism and the work flow of HISM are discussed, and several important characteristics of HISM are analyzed, such as adaptability, dynamic defending, expansibility and robustness. According to HISM, the architecture of the host immune system is constructed, the prototype immune system of the host is implemented based on Windows 2000, which composes all-round host immune defending system, and has many functions such as file immunity, process immunity, network interface immunity and so on. And then, the detector generating technique of HISM is researched, some existing detector generating algorithms are analyzed, a self-mutation detector generating algorithm (SMDGA) is presented, the implementation course of SMDGA is described, the detector is generated by the mutated self string with a number of blank symbols in SMDGA, the performance and complexity of SMDGA are analyzed theoretically, the conclusion indicate that SMDGA overcomes the low generating detector efficiency of the existing algorithms. Finally, the results of theoretical analysis are verified by the simulation of SMDGA.
     In summary, a new way is introduced to solve security problems of the host system through this thesis, the proposed algorithm has a better performance than existing algorithms such as exhaustive detector generating algorithm, and it is practically valuable.
引文
[1]De Castro,Von Zuben.Artificial Immune Systems;Part Ⅱ-A Survey of Applications[R].Technical Report-RT DCA-RT 02/00,2000.
    [2]Paul K.Harmer Paul D.Williams,Gregg H.Gunsch,and Gary B.lamont.An Artificial immune systems Architecture for computer Security Applications[J].IEEE Transactions on Evolutionary Computation,2002,6(3);252-280.
    [3]Timmis J,Neal M and Hunt J.Artificial immune system for data analysis[J].Biosystems,2000,55(1-3);143-150.
    [4]丁永生,任立红.人工免疫系统;理论与应用.模式识别与人工智能[J].2000,13(1);52-59.
    [5]洪征,吴礼发等.AIS在计算机安全领域的应用与展望[J].解放军理工大学(自然科学版),2005,6(6);531-536.
    [6]王磊,潘进,焦李成.免疫规划[J].计算机学报,2000,23(8);806-812.
    [7]肖人彬,王磊.人工免疫系统;原理、模型、分析及展望[J].计算机学报,2002,25(12);1281-1293.
    [8]焦李成,杜海峰.人工免疫系统进展与展望[J].电子学报,2003,31(10);1540-1548.
    [9]Jerne N K.Towards a Network Theory of the Immune System[J].Annual Immunology,1974,125(c);373-389.
    [10]Hoffmann G M.A Neural Network Model Based on the Analogy with the Immune System[J].Theory Biology,1986,122(3);33-67.
    [11]靳蕃,范俊波等.神经网络与神经计算机[M].成都;西南交通大学出版社,1991.
    [12]S.Forrest,A.S.Perelson,L.Allen,and C.R.Cheru R.Kuri.Self-Nonself Discrimination in a Computer[A].In;Proceedings of IEEE Symposium on Research in Security and Privacy[C].Los Alamitos;CA,1994;202-212.
    [13]R Deaton,M Garzon,J A Rose,R C Murphy,S E Stevens,D R Franceschetti.DNA Based Artificial Immune System for Self-Nonself Discrimination[A].In;Proceedings of the 1997 IEEE International Conference on Systems[C].Florida;Orlando,1997;862-865.
    [14]A Hofmeyr,S.Forrest,Architecture for an Artificial Immune System[J].Evolutionary Computation,2000,8(4);443-473.
    [15]T.Okamoto and Y.Ishida.A Distributed Approach against Computer Viruses Inspired by the Immune System[J].IEEE Transactions on Communication.2000,83(5);908-915.
    [16]R.S.Jensen.Immune system for virus detection and elimination[D].Denmark;Technical University of Denmark,2002.
    [17]P.K.harmer,G.B.Lanmont.An Agent Based Architecture for a Computer Virus Immune System[A].In;GECCO 2000[C].Las Vegas,Nevada,USA,1999.
    [18]宋程,基于计算机免疫的病毒检测研究[D].成都;四川大学硕士学位论文,2005.
    [19]Kephart J O,Sorkin G B,Swimmer M.Immune System for Cyberspace[A].In;Proceeding 1997 IEEE International Conference on systems Man and Cybernetics[C].Orlando,USA,1997;879-884.
    [20]Hofmeyr S,Forrest S,Somayaji A.Intrusion detection using sequences of system calls[J].Journal of Computer Security,1998,6(3);151-180.
    [21]Jungwon Kim,Bentley P J.Towards an artificial immune system for network intrusion detection;an investigation of clonal selection with a negative selection operator[A].In;Congress on Evolutionary Computation(CEC-2001)[C].Seoul,Korea,2001;1244-1252.
    [22]Paul D.Williams,Kevin P.Anchor,John L.Bebo,Gregg H.Gunsch,Gray D.Lamout.CDIS;Towards a Computer Immune System for Detecting Network Intrusions[A].In;Proceedings 4th International Symposium[C].Las Davis;CA,2001;117-133.
    [23]罗文坚.面向入侵检测的人工免疫模型和算法研究[D].合肥;中国科学技术大学博士学位论文,2003.
    [24]P.D haeseleer,S.Forrest,P.Helman,An Immunological Approach to Change Detection;Algorithms,Analysis and Implications[A].In;Proceeding the 1996 IEEE Symposium on Security and Privacy[C].Las Alamitos;CA,1996;110-119.
    [25]M.Ayara,J.Timmis,L.N.de Lemos,R.de Castro,R.Duncan.Negative Selection;How to Generate Detectors[A].In;Proceedings of 1st International Conference on Artificial Immune Systems(ICARIS-2002)[C].UK;Springer-Verlag,2002;89-98.
    [26]张衡,吴礼发等.一种r可变否定选择算法及其仿真分析[J].计算机学报,2005,28(10);1614-1619.
    [27]罗文坚,曹先彬等.检测器自适应生成算法[J].自动化学报,2005,31(6);907-916.
    [28]程永新,许家珆.一种新型检测器生成算法模型[A].见;第十五届中国神经网络大会(CNNC2007)暨首届中国人工免疫系统专题会议(CAISC06)[C].哈尔滨;哈尔滨工程大学学报杂志社,2006;252-256.
    [29]刘国英,陈蔼祥等.一种新的免疫入侵检测器生成算法[J].计算机技术与发展,2006,16(5);128-130.
    [30]莫宏伟.人工免疫系统原理与应用[M].哈尔滨;哈尔滨工业大学出版社,2002.
    [31]朱锡华.生命的卫士——免疫系统[M].北京;科学技术文献出版社,1999.
    [32]马启肇.免疫学基础及病原生物学[M].成都;四川科学技术出版社,1996.
    [33]Leandro N de Castro,Jon Timmis.Artificial Immune Systems;A Novel Computational Intelligence Approach[M].London;Springer-Verlag,2002.
    [34]李涛.计算机免疫学[M].北京;电子工业出版社,2004.
    [35]L N De Castro,F J Von Zuben.The Clonal Selection Algorithm with Engineering Applications[A].In;Proceedings of GECCO-2000[C],Las Vegas,Nevada,USA,2000;36-43.
    [36]Niloy Ganguly and Andreas Deutsch.Developing Efficient Search Algorithms for P2P Networks Using Proliferation and Mutation[A].In;Proceedings of 3rd International Conference on Artificial Immune Systems(ICARIS-2004)[C].Berlin Heidelberg,2004;357-371.
    [37]赵丽.基于系统调用的计算机免疫系统研究[D].保定;河北大学硕士学位论文,2004.
    [38]孙勇智.人工免疫系统模型、算法及其应用研究[D].杭州;浙江大学博士学位论文,2004.
    [39]潘峰.丁云飞等.基于逐级反向选择算法的入侵检测[J].上海交通大学学报,2005,39(4);582-584.
    [40]丁菊玲.一种基于人工免疫的网络入侵动态取证方法[D].成都;四川大学硕士学位论文,2005.
    [41]王益丰.一种基于人工免疫的网络安全风险检测方法[D].成都;四川大学硕士学位论文,2005.
    [42]陈桓.一种新的计算机病毒免疫模型[D].成都;四川大学硕士学位论文,2005.
    [43]程永新.基于免疫原理的新型入侵检测模型及算法研究[D].成都;电子科技大学硕士学位论文,2006.
    [44]郑瑞娟.生物启发的多维网络安全模型研究[D],哈尔滨,哈尔滨工程大学硕士学位论文,2006.
    [45]Gianni Tedesco,Jamie Twycross,and Uwe Aickelin.Integrating Innate and Adaptive Immunity for Intrusion Detection[A].In;Proceedings of 5th International Conference on Artificial Immune Systems(ICARIS-2006)[C].Berlin Heidelberg,2006;193-202.
    [46]Carlos A.Coello,Daniel Cortes Rivera,and Nareli Cruz Cortes.Use of an Artificial Immune System for Job Shop Scheduling[A].In;Proceedings of 2nd International Conference on Artificial Immune Systems(ICARIS-2003)[C].Berlin Heidelberg,2003;1-10.
    [47]Z.X.Ong,J.C.Tay,and C.K.Kwoh.Applying the Clonal Selection Principle to Find Flexible Job-Shop Schedules[A].In;Proceedings of 4th International Conference on Artificial Immune Systems(ICARIS-2005)[C],Berlin Heidelberg,2005;442-455.
    [48]童晓玲.基于人工免疫算法的函数优化问题研究[D].武汉;武汉理工大学硕士学位论文,2006.
    [49]莫宏伟,人工免疫网络记忆分类器原理与应用研究[D].哈尔滨;哈尔滨工程大学博士学位论文,2005.
    [50]George B.Bezerra,Tiago V.Barral,Leandro N.de Castro,and Fernando J.Von Zuben.Adaptive Radius Immune Algorithm for Data Clustering[A].In;Proceedings of 4th International Conference on Artificial Immune Systems(ICARIS-2005)[C].Berlin Heidelberg,2005;290-303.
    [51]Krzysztof Ciesielski,S lawomir T.Wierzchon,and Mieczys law A.K lopotek.An Immune Network for Contextual Text Data Clustering[A].In;Proceedings of 5th International Conference on Artificial Immune Systems(ICARIS-2006)[C].Berlin Heidelberg,2006;432-445.
    [52]杜海峰,王孙安.基于ART-人工免疫系统的多级压缩机故障诊断[J].机械工程学报,2002,38(4);88-90.
    [53]Guan-Chun Luh,Chun-Yin Wu,and Wei-Chong Cheng.Artificial Immune Regulation(AIR)for Model-Based Fault Diagnosis[A].In;Proceedings of 3rd International Conference on Artificial Immune Systems(ICARIS-2004)[C].Berlin Heidelberg,2004;28-41.
    [54]张清华.基于人工免疫系统的机组故障诊断技术研究[D].广州;华南理工大学博士学位论文,2004.
    [55]Alexander Tarakanov and Yuri Tarakanov.A Comparison of Immune and Neural Computing for Two Real-Life Tasks of Pattern Recognition[A].In;Proceedings of 3rd International Conference on Artificial Immune Systems(ICARIS-2004)[C].Berlin Heidelberg,2004;236-249.
    [56]Utpal Garain,Mangal P.Chakraborty,and Dipankar Dasgupta.Recognition of Handwritten Indic Script Using Clonal Selection Algorithm[A].In;Proceedings of 5th International Conference on Artificial Immune Systems(ICARIS-2006)[C].Berlin Heidelberg,2006;256-266.
    [57]Emma Hart,Peter Ross,Andrew Webb,Alistair Lawson.A Role for Immunology in "Next Generation" Robot Controllers[A].In;Proceedings of 2nd International Conference on Artificial Immune Systems(ICARIS-2003)[C].Berlin Heidelberg,2003;46-56.
    [58]T Knight,Timmis.A Multi-Layered Inspired Approach to Data Mining[A].In;Proceedings of the 4th International Conference on Recent Advances in Soft Computing[C].Nottingham,2002;266-271.
    [59]裴波,张衡等.基于生物免疫特性的主机免疫模型[J].吉林大学学报(信息科学版),2005,22(3);273-278.
    [60]刘松,主机安全防护技术的研究与实现[D].北京,北京邮电大学硕士学位论文,2006.
    [61]王锡林,郭庆平,程胜利.计算机安全[M].北京;人民邮电出版社,1995.
    [62]张红旗等.信息网络安全[M].北京;清华大学出版社,2002.
    [63]焦李成,杜海峰等.免疫优化计算、学习与识别[M].北京;科学出版社,2006.
    [64]吴琨,刘岸等.一个基于策略机制的文件免疫模型FIX及其实现[J].计算机应用与软件,2005,22(1);6-9.
    [65]David A.Solomon,Mark E.Russionovich Microsofe Windows 2000 技术内幕(第3版)[M].北京大学出版社2001.
    [66]杨东勇.基于人工免疫系统的入侵检测器生成算法研究[D].杭州;浙江工业大学硕士学位论文,2005.
    [67]郭振河,谭营,刘政凯.基于阴性选择原则的Non-self探测器生成算法[J].小型微型计算机系统.2005,26(6);959-964.
    [68]杨华玲.基于改进Kim模型的检测器生成算法研究[D].秦皇岛;燕山大学硕士学位论文,2006.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700