首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
一个基于免疫的分布式入侵检测系统模型   总被引:3,自引:0,他引:3  
楚赟  戴英侠  万国龙 《计算机应用》2005,25(5):1153-1157
传统的入侵检测系统大多采用集中式的分析引擎,误报率较高且缺乏自适应性,已难以满足日益发展的大规模分布式网络环境的安全需求。生物免疫系统处理外来异体时呈现出的分布性、多样性、自适应性和高效性等多种特性,为入侵检测系统的研究提供了一个新的思路。引用生物免疫机制,并结合数据挖掘技术提出了一种基于免疫的分布式入侵检测系统模型。文中详细描述了模型的体系结构和工作机制,并对模型特性进行了分析。  相似文献   

2.
提出了一种基于适应性免疫和移动agent的分布式入侵检测系统(ADIDS)的新模型。充分利用agent本身的独立性与自主性,削弱各检测部件间的相关性;同时将适应性免疫原理引入模型中,检测子通过自我学习进化和变异,实现识别新的特殊种类的入侵;通过免疫记忆和自裂变,加速未来的检测和降低误报率,提高了系统的检测能力和效率。仿真实验证明了模型的检测效率高、误报率低、自适应性强。  相似文献   

3.
基于移动agent的分布式入侵检测系统研究*   总被引:1,自引:0,他引:1  
为了提高现有分布式入侵检测系统的效率和性能,提出了一种基于移动agent的分布式入侵检测系统模型。将移动agent技术应用于入侵检测中,并给出了其移动agent间的可靠通信方法,实现了agent的协同检测。实验结果表明,由于移动agent的应用,入侵检测系统的节点成为了可移动的部件,从而使该模型具有了更强的抗攻击性和入侵检测能力。  相似文献   

4.
结合移动agent技术和免疫系统的特性,从实际应用的角度出发,将两者的优势引入网络入侵检测系统的设计,提出了一个基于移动agent的免疫入侵检测系统MAgentIDS模型,并对其做了较为深入的研究。重点分析了用于入侵检测系统的免疫耐受模型,改进了检测分析agent采用的否定选择核心算法。开发了原型系统并模拟一些典型入侵行为,完成入侵检测系统的检测任务,实验结果表明该模型较原有的方法具有更好的适应性。  相似文献   

5.
一种基于移动agent的新型分布式入侵检测系统   总被引:1,自引:0,他引:1  
本文首先阐述了入侵检测系统的基本概念、分类及移动agent的基本概念和优点;还分析了一种传统的分布式入侵检测系统模型;最后,提出了一种基于移动agent的新型分布式入侵检测系统的结构模型,并分析了它的工作过程及主要特点。  相似文献   

6.
入侵检测系统被认为是继防火墙之后的网络第二道安全闸门,而生物免疫系统的分布性、多样性、自适应性、记忆性等正是入侵检测系统所期望实现的。本文将生物免疫机理应用于侵检测技术中,构建了一个基于生物免疫机理的分布式的入侵检测模型,详细阐述了该模型的体系结构、工作原理及流程,并对该模型使用的负选择算法和克隆选择算法进行了描述和分析。  相似文献   

7.
基于免疫计算的agent系统研究   总被引:5,自引:0,他引:5  
由于免疫系统具有良好的特性以及与multi-agent系统的相似性,因此将免疫机理应用于multi-agent系统的研究越来越受到关注。该文提出了一种新的实体agent——免疫agent和多免疫agent系统。首先给出了免疫agent的功能、结构以及形式化描述,然后构造了基于独特性网络理论的多免疫agent系统模型,借鉴生态学协同进化机理提出了系统中免疫agent之间的四种交互关系:共生、共栖、捕食者-猎物和竞争关系,并给出了免疫agent的浓度函数表达式。  相似文献   

8.
文中在深入分析免疫原理的基础上,提出了一个分层检测的分布式入侵检测系统模型.模型采用提取检测规则库中的规则生成自动匹配的四层检测规则集,经反向筛选后分别注入对应检测层的移动检测代理(MDA),MDA迁移到各检测代理子结点处协同完成入侵检测和响应,实现免疫特性.具有这样免疫特性的多代理能对大流量的分布式网络进行分层检测和响应,能在局部和全局的不同层次上检测入侵攻击,具有较好的自适应性、可扩展性和智能性.  相似文献   

9.
Agent技术在分布式入侵检测系统的应用研究*   总被引:1,自引:1,他引:0  
剖析了现有的分布式入侵检测系统及其在网络中的优势,将代理(agent)技术应用到分布式入侵检测系统中,并在此基础上提出了一种基于agent的分布式入侵检测系统(agent-based distributed intrusion detectionsystem,ADIDS)的新模型。ADIDS采取无控制中心的多agent结构,充分利用agent本身的独立性与自主性,尽量降低各检测部件间的相关性,避免了单个中心分析器带来的单点失效问题。各个数据采集部件、检测部件都是独立的单元,不仅实现了数据收集的分布化,而且将入侵检测和实时响应分布化,提高了系统的健壮性,真正实现了分布式检测的思想。  相似文献   

10.
李建飞  吴国新 《微机发展》2005,15(1):131-134
文中在深入分析免疫原理的基础上,提出了一个分层检测的分布式入侵检测系统模型。模型采用提取检测规则库中的规则生成自动匹配的四层检测规则集,经反向筛选后分别注入对应检测层的移动检测代理(MDA),MDA迁移到各检测代理子结点处协同完成入侵检测和响应,实现免疫特性。具有这样免疫特性的多代理能对大流量的分布式网络进行分层检测和响应,能在局部和全局的不同层次上检测入侵攻击,具有较好的自适应性、可扩展性和智能性。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
蒙古语言是中国蒙古族使用的通用语言,由于蒙古文区别于其他文字的书写方式和其自身变形机制等特点,在很多通用的文字处理引擎中都不被支持。在嵌入式产品开发与应用领域中Linux加QTE已经成为流行方式。该文给出了一种在QTE环境上实现基于标准Unicode的蒙古文点阵显示和变形算法, 并自定义了支持蒙古文的QTE组件,扩展了QTE功能,为在Linux加QTE方式的嵌入式体系结构中处理蒙古文提供了一种解决方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号