Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Design》 2004-08
Add to Favorite Get Latest Update

Research on the model of immune firewall

MAO Xin-yu~1, LIANG Yi-wen~2 (1. East Lake school, Wuhan University, Wuhan 430072, China; 2. School of Computer, Wuhan University, Wuhan 430072, China)  
A new model of firewall is presented according to computer immunology. The structure of this model includes two layers. The first layer is called traditional layer, the second layer is called immune layer. The traditional technology of firewall is used in the first layer. The second layer is based on the principle of computer immunology. The rule tree detector is used in the second layer, selfstudying, producing dynamic rule and solving the flaw of the first layer in self-adaptation way. The rule tree detector is evolved by GA and GE The new model of firewall has the characters of self-adaptation and dynamic.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 LIU Meng,JIANG Mei(School of Computer Engineering,Qingdao Technological University,Qingdao 266033,China);Intrusion Detection Model Based on Mobile-Agent and Artificial Immunity[J];Journal of Qingdao Technological University;2008-02
2 ZHENG Rui-juan1,2,WANG Hui-qiang2,PANG Yong-gang2(1. College of Electronic & Information Engineering,Henan University of Science and Technology,Luoyang 471003,China;2. College of Computer Science & Technology,Harbin Engineering University,Harbin 150001,China);Modeling and Simulation of Bio-inspired Multi-Net Security System[J];Journal of System Simulation;2008-05
Chinese Journal Full-text Database 4 Hits
1 YANG He (Department of Computer Science,Hubei Institute of Education,Wuhan Hubei 430250,China);Evolutionary Compute Used in Artificial Immune Systems[J];Training and Research;2005-02
2 LU Jian-hua1,2,YUAN Xi-guo2,FU Hai-dong2(1.Department of Control Science and Engineering,Huazhong University of Science and Technology,Wuhan 430074,China;2.College of ComputerScience and Technology,Wuhan University of Science and Technology,Wuhan 430081,China);Constructional method of self-set based on fuzzy pattern recognition[J];Computer Engineering and Design;2007-01
3 FU Hai-dong,XIE Qi,YUAN Xi-guo(College of Computer Science and Technology,Wuhan University of Science and Technology,Wuhan 430081,China);Constructional algorithm of principal and subordinate structure self-set based on decision trees[J];Computer Engineering and Design;2008-07
4 FU Hai-dong,LI Chun-xiang(Dept.of Computer Science & Technology,Wuhan University of Science & Technology,Wuhan 430081,China);Construction and Evolutionary Algorithm of Self Sets Based on Rough Sets Theory[J];Computer Technology and Development;2007-12
Chinese Journal Full-text Database 10 Hits
1 Jiang Mei, Zhang Yan and Li Lan (Department of Computer Science and Engineering, QIAE, Qingdao 266033);A New Technology of Intrusion Detection Based on Biological Immune System[J];Journal of Qingdao Institute of Architecture and Engineering;2004-03
2 JIANG Mei,LIU Meng,WANG Zhuo(College of Computer Engineering,Qingdao Technological University, Qingdao 266033,China);Network security model based on biological immune system[J];Journal of Qingdao Technological University;2007-05
3 DUAN Haixin, WU Jianping, LI Xing (Network Research Center, Tsinghua University, Beijing 100084, China);Dynamic allocation and hash table based match algorithms for firewall rules[J];Journal of Tsinghua University(Science and Technology);2001-01
4 ZHENG Yan-jun~(1,2), WANG Shu-xia~2(1 Department of Computer Science & Technology,Wuhan University,Wuhan,Hubei 430072,China;2 Department of Computer Science,Xiaogan College,Xiaogan,Hubei 432100,China);Research on Intrusion Detection Based on Artificial Immune Theory[J];Journal of Shihezi University(Natural Science);2005-01
5 QIYong, ZHANG Kun, LIU Feng-yu, ZHONGYi (Department of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094, China);Distributed model of intrusion detection system based on immunology[J];Computer Engineering and Design;2004-04
6 LIU Zhen-peng, YANG Shao-yun, ZHANG Shou-hua, ZHOU Te (College of Computer, Hebei University, Baoding 071002, China);Distributed-based intrusion detection computer immunity model[J];Computer Engineering and Design;2004-11
7 Chao Xiaolian~1,Yang Zupei~1,Du Zonggang~2,Kang Chao~1,Yang Lili~1 (1.School of Chemistry and Materials Science,Shanxi Normal University,Xi'an 710062 China; 2.The 165 ~(th) Institute of the 6~(th) Academy of CASC,Xi'an 710100, China);Self-repairing Technology And Self-repairing Composites[J];Plastics Science and Technology;2006-01
8 ;Personal Firewall for Stateful Packet Filtering Based on NDIS[J];Experiment Science and Techndogy;2004-04
9 ZHANG Ying-jiang,CHEN Chi (College of Computerscience, Hubei University of Technology, Wuhan Hubei 430068, China);Research and Applications of the WEB Content Filter[J];Journal of Wuhan Textile S.n.T. Institute;2005-04
10 Gao YunZhi,Wang Kun,Xang XueMing (Southwest University of Science and Technology,Mianyang,China,621002);THE RESEARCH ABOUT DECEIVE OF TCP ON SECURITY OF NETWORK[J];Journal of SWUST;2003-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved