Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Chinese Journal of Computers》 2005-10
Add to Favorite Get Latest Update

Antibody Generation and Antigen Detection Component in Immune-Based Network Intrusion Detection System

YAN Qiao~(1)) JIANG Yong~(1)) WU Jian-Ping~(2))~(1))(Graduate School at Shenzhen, Tsinghua University, Shenzhen 518055)~(2))(Department of Computer Science and Technology, Tsinghua University, Beijing 100084)  
The authors design and develop an immune-based network intrusion detection system--AINIDS, which includes a data collector component, a packet head parser and feature extraction component, antibody generation and antigen detection component, co-stimulation and report component and rule optimization component. The antibody generation and antigen detection component is the key module of AINIDS. In the component the passive immune antibodies and the automatic immune antibodies that include memory automatic immune antibodies and fuzzy automatic immune antibodies are proposed by analogy with natural immune system. The passive immune antibodies inherit available rules and can detect known intrusion rapidly. The automatic immune antibodies integrate statistic method with fuzzy reasoning system to improve the detection performance and can discover novel attacks. AINIDS is tested by the data collected from the LANs and by the data from 1999 DARPA intrusion detection evaluation data sets. Both experiments prove AINIDS that includes antibody generation and antigen detection component has good detection rate for old and new attacks.
【Fund】: 国家“九七三”重点基础研究发展规划项目(2003CB314805);; 中国博士后科学基金(20040350027);; 广东省自然科学基金(34308)资助.~~
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 10 Hits
1 Chai Zhengyi1,2 Liu Fang1 Zhu Sifeng1(1 School of Computer Science and Technology,Xidian University,Xi′an 710071,China;2 School of Information Science and Engineering,Henan University of Technology,Zhengzhou 450001,China);Novel intelligent model for intrusion prevention[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2010-01
2 YAN Xuan-hui. School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350007,China;Improvement of antibody/antigen coding in immune intrusion detection model.[J];Computer Engineering and Applications;2007-31
3 ZHANG Yu-hua,ZHANG XingDepartment of Computer Science and Engineering,Henan University of Urban Construction,Pingdingshan,Henan 467064,China;Research on Intrusion Detection System oriented variable length detector algorithm[J];Computer Engineering and Applications;2010-33
4 YAN Qiao(Information Engineering School,Shenzhen University,Shenzhen 518060,China);Mathematic Description of Intrusion Detection System Based on Immune Mechanism[J];Computer Science;2009-06
5 PENG Min1,3,TANG Jun2,3(1.School of Information Science & Engineering,Central South University,Changsha 410083,China;2.School of Software,Tongji University,Shanghai 200092;3.Hunan Urban Construction College,Xiangtan 411101,China);Detector Real-time Generation Algorithm and Its Application[J];Computer Engineering;2010-19
6 SUN Fu-Xiong~(1)) HUANG Tian-Shu~(2))~(1))(Institute of Information,Zhongnan University of Economics and Law,Wuhan 430074)~(2))(Institute of Electronic Information,Wuhan University,Wuhan 430072);The Research of the Stimulation and Response Mechanism of Detector in Immune-Based Detection Model[J];Chinese Journal of Computers;2006-11
7 LIU Shuai1a,1b,ZHANG Xing2 (1.a.Institute of Advanced Control & Intelligent Information Processing,b.College of Computer & Information Engineering,Henan University,Kaifeng Henan 475000,China;2.Dept.of Computer Science & Engineering,Henan University of Urban Construction,Pingdingshan Henan 467044,China);Study of creditability for intrusion detection system based on immunity[J];Application Research of Computers;2010-03
8 Zheng Yuefeng1 Chen Jungan21(College of Adult Education,Zhejiang University of Technology,Hangzhou 310014,Zhejiang,China)2(School of Electronic Information,Zhejiang Wanli University,Ningbo 315100,Zhejiang,China);STUDY ON A SELF-ADAPTED DYNAMIC NEGATIVE SELECTION ALGORITHM FOR INTRUSION DETECTION[J];Computer Applications and Software;2009-09
9 Chen Xuezhao1 Yang Jie21(Department of Computer,Yongzhou Vocational Technical College,Yongzhou 425100,Hunan,China)2(Hunan University of Science and Engineering,Yongzhou 425100,Hunan,China);ON FALSE ALARM RATE PROBLEM OF IDS BASED ON IMMUNE COMPUTATION[J];Computer Applications and Software;2010-07
10 Xu Qunling(School of Educational Science and Technology,Weifang University,Weifang 261061,Shandong,China);ON DYNAMIC GENERATION ALGORITHM OF IDS-ORIENTED DETECTORS[J];Computer Applications and Software;2011-01
Chinese Journal Full-text Database 8 Hits
1 LIU Lang1,2,DENG Wei1,3(1.School of Management and Economy,Beijing Institute of Technology,Beijing 100081; 2.School of Economy and Management,Nanchang Aviation University,Nanchang 330036; 3.Division of Basic Courses,Shanghai Maritime University,Shanghai 200135);A Design of Forewarning System Basing on Danger Immune Theory[J];Journal of Beijing Institute of Technology(Social Sciences Edition);2007-04
2 LIU Lang1,HUANG Youfang2(1.School of Economy and Management,Nanchang HangKong University,Nanchang 330036; 2.Research Center of Logistics,Shanghai Maritime University,Shanghai 200135);Structure of Response Mechanism to Emergency Logistics Based on Immune Response Theory[J];Journal of Beijing Institute of Technology(Social Sciences Edition);2011-02
3 Wu Zhaorun Qi Guoping Li Gaoliang(North University of China,Taiyuan 030051,Shanxi);Analysis and Optimization of Wireless Local Area Network for the University[J];Computer & Telecommunication;2011-04
4 WANG Hui1,BI Xiaojun2,YU Lijun1,ZHANG Lijun1(1.College of Automation,Harbin Engineering University,Harbin 150001,China;2.College of Information and Communication Engineering,Harbin Engineering University,Harbin 150001,China);An adjustable threshold immune negative selection algorithm based on vaccine theory[J];Journal of Harbin Engineering University;2011-01
5 MA Xin1,2,LIANG Yan-chun1,2,TIAN Ye1,2,YU Tao3 (1.College of Computer Science and Technology, Jilin University, Changchun 130012,China; 2.Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education, Jilin University, Changchun 130012, China; 3.Changchun Institute of Optics, Fine Mechanics and Physics, Chinese Academy of Sciences, Changchun 130033, China);An immune and contract net protocol-based multi-agent intrusion detection system[J];Journal of Jilin University(Engineering and Technology Edition);2011-01
6 XING Jin 1, WANG Chun-ling 1, FAN Wei 2, SUI Li-hua 2, HE Zheng-ming 1 (1.National Institute for the Control of Pharmaceutical and Biological Products, Beijing 100050, China) (2.Laboratory Animal Centre of Academy of Military Medical Sciences, Beijing 100071, China);Production and Application of Diagnostic Reagent for Diagnosis of Brucella spp.of Laboratory Dogs[J];Laboratory Animal Science and Administration;2004-02
7 SHI Shi-liang,Prof. PENG Xin LI Run-qiu,Senior Engineer(School of Energy & Safety Engineering, Hunan University of Science & Technology, Xiangtan411201, China);Accident Prevention Based on Artificial Immune Theory[J];China Safety Science Journal(CSSJ);2009-01
8 Wang Yuao, et al. Department of Surgery, Hong Zhou Medical College, Hongzhou 310012;The effect of surgical infection on serum immunoglobulin (Ig) and complement3 (C_3)[J];Chinese Journal of Practical Surgery;1996-10
Chinese Journal Full-text Database 10 Hits
1 ZENG Bo YANG Jian-jun (Beijing University of Aeronautics and Astronautics, School of Mechanical Engineering and Automation);Agent Coordination Mechanisms for Scheduling System Based MAS[J];Journal of Beijing University of Aeronautics and Astronautics;2002-04
2 ZHOU Ying, ZHENG Deling, WEI Yaoguang, FU Dongmei Information Engineering School, University of Science and Technology Beijing, Beijing 100083, China School of Electrical Engineering and Automation, Hebei University of Technology, Tianjin 300130, China;Recognition Algorithm Based on Biological Immune Principle[J];Journal of University of Science and Technology Beijing;2004-04
3 GUO Hong, CAO Yuan da(Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China);Intrusion Patterns Mining in IDS[J];Journal of Beijing Institute of Technology;2003-02
4 ZENG Zhi feng, YANG Yi xian (Information Enginneering School,Beijing University of Posts and Telecommunications, Beijing 100876, China);Design and Implement of a New Intrusion Detection and Recovery System[J];Journal of Beijing University of Posts and Telecommunications;2001-02
5 MA Yi1,CHEN Guan-qing2,FANG Ning-sheng1(1.School of Software Engineering,Southeast University,Nanjing 210096,China;2.Department of Computer Science,Nanjing Normal University,Nanjing 210097,China);On the 3G-based Hand-Holding Equipment and the Security of Wireless Network Information[J];Journal of Chongqing Institute of Technology(Natural Science Edition);2007-03
6 YAO Yu, GAO Fu-xiang, YU Ge(School of Information Science & Engineering, Northeastern University, Shenyang 110004, China.);Dissipative Chaotic Neuron and Its Time-Delay Classification[J];JOURNAL OF NORTHEASTERN UNIVERSITY;2004-09
7 Peng Chunhua (East China Jiaotong University Nanchang 330013 China);Optimal PMU Placement Based on Immune BPSO Algorithm and Topology Observability[J];Transactions of China Electrotechnical Society;2008-06
8 Shi Tingna Zhang Dianlin Xia Changliang Chen Wei Wan Jianyu(Tianjin University Tianjin 300072 China);Fuzzy-Immune-PID Controller Based on Genetic Tuning for Permanent Magnet AC Servo Control System[J];Transactions of China Electrotechnical Society;2008-07
9 ZHANG Feng-bin, YANG Yong-tian (Harbin Engineering University, Harbin 150001, China; Harbin University of Science and Technology, Harbin 150080, China);Research on the immune-based technique to detect intrusions[J];Electric Machines and Control;2004-02
10 WU Zhi,XU Jia-yi (School of Applied Mathematics, UEST of China Chengdu 610054);Immune Principles Applications of Multi-Agent-Based IDS[J];Journal of University of Electronic Science and Technology of China;2005-03
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Feng (College of Computer Science and Technology,North China Electric Power University,Baoding,Hebei 071003,China);A New Method for Detector Generation Based on Gene Library[J];Computer Security;2009-09
2 YAN Xuan-hui (School of Mathematics and Computer Science,Fujian Normal University,Fuzhou,Fujian 350007,China);An Artificial Immune-Based Intrusion Detection Model Using Vaccination Strategy[J];Acta Electronica Sinica;2009-04
3 Liu Ning,Zhao Jianhua (Department of Computer Science,ShangLuo University,Shangluo 726000,China);An intrusion detection system based on biological immune for wireless sensor network[J];Journal of Guilin University of Electronic Technology;2011-02
4 XI Liang,ZHANG Feng-bin,WANG Da-wei(School of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China);Mix-matching Rules Negative Selection Algorithm[J];Journal of Harbin University of Science and Technology;2009-05
5 LI Yuan-yuan,WANG Lei,LIANG Li,LI HuiSchool of Computer Science and Engineering,Xi’an University of Technology,Xi’an 710048,China;Faced-AIS medical system of application service’s research and design[J];Computer Engineering and Applications;2009-03
6 LIU Ning,ZHAO Jianhua Department of Computer Science,Shangluo University,Shangluo,Shaanxi 726000,China;Applying immune theory to intrusion detection system for wireless sensor network[J];Computer Engineering and Applications;2011-15
7 WANG Lei,LIU Ge-feng,LI Yuan-yuan(School of Computer Science & Engineering,Xi’an University of Technology,Xi’an 710048);AIS-based Service Match Model[J];Computer Engineering;2008-24
8 HU Boa, HU Mina, LI Yuan-shanb (a.College of Science & Technology, b.Modern Educational Technology Center, Jiangxi Normal University, Nanchang 330027, China);Boundary-aware detector generation mechanism of negative selection algorithm[J];Application Research of Computers;2011-01
9 YANG Fu-gang1,2(1.School of Information & Electronic,Shandong Institute of Business & Technology,Yantai Shandong 264005,China;2.School of Control Science & Engineering,Shandong University,Jinan 250061,China);Adaptive clone and suppression artificial immune algorithm[J];Application Research of Computers;2011-02
10 PENG Min(Department of Information Engineering,Hunan Urban Construction College,Xiangtan 411101,China);Network Intrusion Detection and Risk Prediction Model Based on Immunity[J];Computer Engineering;2011-11
China Proceedings of conference Full-text Database 3 Hits
1 ZHANG Hong-yu~(1,2) LIU Bao-xu~3 Li En-bao~4 (1.Graduate School,Chinese Academy of Sciences,Beijing 100049;2.Beijing International Telemunication and Post Office,Beijing 100600;3.Computering Center,Institute of High Energy Physics,Chinese Academy of Sciences,Beijing 100049;4.Service Development Center of the Service Bureau,State Commission Office for Public Sector Reform,Beijing 100028);入侵检测系统攻击特征库的设计与实现[A];[C];2008
2 ZHANG Hong-yu~(1,2) LIU Bao-xu~3 Li En-bao~4 (1.Graduate School,Chinese Academy of Sciences.Beijing 100049;2.Beijing International Telemunication and Post Office,Beijing 100600,3. Computering Center.Institute of High Energy Physics,Chinese Academy of Sciences.Beijing 100049;4.Service Development Center of the Service Bureau.State Commission Office for Public Sector Reform,Beijing 100028);入侵检测系统攻击特征库的设计与实现[A];[C];2008
3 CAI Xiao-hua 1 ,WANG Ru-chuan 1,2 ,REN Xun-yi 1 (1.College of Computer, Nanjing University of Posts and Telecommunications, Nanjing Jiangsu 210003, China; 2.State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing Jiangsu 210093, China);Fuzzy Filtering Dynamic Firewall Framework Based On IDS[A];[C];2007
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 XIAO Si-he, LU Hong-ying (College of Network Education, Chengdu University of Technology, China);Intrusion detection system based on dynamic fuzzy neural network[J];Journal of Chengdu University of Technology(Science & Technology Edition);2004-04
2 ;基于免疫的网络入侵检测系统[J];Computer and Information Technology;2001-06
3 ZHAO Bo,LI Yong-zhong,XU Jing,YANG Ge(School of Electrics and Information,Jiangsu University of Science and Technology,Zhenjiang 212003,China);A New Hidden Markov Model Training method for Anomaly Intrusion Detection[J];Computer Knowledge and Technology(Academic Exchange);2007-16
4 LIU Hai-feng,QING Si-han,Meng Yang,LIU Wen-qing (Institute of Software Chinese Academy of Sciences,Beijing 100080,China;Engineering Research Center for Information Security Technology Chinese Academy of Sciences,Beijing 100080,China);A New Audit-Based Intrusion Detection Model and Its Implement Mechanism[J];Acta Electronica Sinica;2002-08
5 ZHAO Yu-ming,ZHANG Wei,TENG Shao-hua(Facultyof Computer, Guangdong University of Technology, Guangzhou 510090,China);The Study of Bro: a System for Detecting Network Intruder in Real-time[J];Journal of Guangdong University of Technology;2005-02
6 Wang Min Wang Wanjun Xiong Chunshan Huang Xinhan Dept. of Control Sci. & Eng., HUST, Wuhan 430074, China.;Fault Diagnosis Technology Based on Multi-sensor Data Fusion[J];Journal of Huazhong University of Science and Technology;2001-02
7 MA Heng Tai, JIANG Jian Chun, LIU Ke Long, and QING Si Han (Engineering Research Center for Information Security Technology, Chinese Academy of Sciences, Beijing 100080) (Institute of Software, Chinese Academy of Sciences, Beijing 100080);A DISTRIBUTED NETWORK MONITOR SYSTEM BASED ON UNIX[J];Journal of Computer Research and Development;2001-03
8 WANG Xiao-Cheng, LIU En-De, and XIE Xiao-Quan (Institute 706, China Aerospace Machinery and Electronic Corporation, Beijing 100854);ATTACK CLASSIFICATION RESEARCH AND A DISTRIBUTED NETWORK INTRUSION DETECTION SYSTEM[J];Journal of Computer Research and Development;2001-06
9 Liu Mei lan; Yao Jing song (North Computation Centre,Beijing 100091);APPlication Of Neural Network in Intrusion Detection System[J];COMPUTER ENGINEERING AND APPLICATIONS;1999-06
10 Zeng Zhifeng Yang Yixian (Department of Information Engineering,Beijing University of Posts and Telecommunications, Beijing 100876);On the Trend and Study of Network Security[J];COMPUTER ENGINEERING AND APPLICATIONS;2000-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved