{"title":"基于人工免疫系统的网络入侵主动防御模型","authors":"Cheng Zhang, Jing Zhang, Sunjun Liu, Yintian Liu","doi":"10.1109/ICNC.2008.782","DOIUrl":null,"url":null,"abstract":"Based on artificial immune theory, a new model of active defense for analyzing the network intrusion is presented. Dynamically evaluative equations for self, antigen, immune tolerance, mature-lymphocyte lifecycle and immune memory are presented. The concepts and formal definitions of immune cells are given, the hierarchical and distributed management framework of the proposed model are built. Furthermore, the idea of biology immunity is applied for enhancing the self-adapting and self-learning ability to adapt continuously variety environments. The experimental results show that the proposed model has the features of real-time processing, self-adaptively, and diversity, thus providing a good solution for network surveillance.","PeriodicalId":6404,"journal":{"name":"2008 Fourth International Conference on Natural Computation","volume":"97 1","pages":"97-100"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Network Intrusion Active Defense Model Based on Artificial Immune System\",\"authors\":\"Cheng Zhang, Jing Zhang, Sunjun Liu, Yintian Liu\",\"doi\":\"10.1109/ICNC.2008.782\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Based on artificial immune theory, a new model of active defense for analyzing the network intrusion is presented. Dynamically evaluative equations for self, antigen, immune tolerance, mature-lymphocyte lifecycle and immune memory are presented. The concepts and formal definitions of immune cells are given, the hierarchical and distributed management framework of the proposed model are built. Furthermore, the idea of biology immunity is applied for enhancing the self-adapting and self-learning ability to adapt continuously variety environments. The experimental results show that the proposed model has the features of real-time processing, self-adaptively, and diversity, thus providing a good solution for network surveillance.\",\"PeriodicalId\":6404,\"journal\":{\"name\":\"2008 Fourth International Conference on Natural Computation\",\"volume\":\"97 1\",\"pages\":\"97-100\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Fourth International Conference on Natural Computation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNC.2008.782\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Fourth International Conference on Natural Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNC.2008.782","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Intrusion Active Defense Model Based on Artificial Immune System
Based on artificial immune theory, a new model of active defense for analyzing the network intrusion is presented. Dynamically evaluative equations for self, antigen, immune tolerance, mature-lymphocyte lifecycle and immune memory are presented. The concepts and formal definitions of immune cells are given, the hierarchical and distributed management framework of the proposed model are built. Furthermore, the idea of biology immunity is applied for enhancing the self-adapting and self-learning ability to adapt continuously variety environments. The experimental results show that the proposed model has the features of real-time processing, self-adaptively, and diversity, thus providing a good solution for network surveillance.