Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Engineering Journal of Wuhan University》 2012-01
Add to Favorite Get Latest Update

Filtering for network forensics data on artificial immune network clustering

YANG Jun1,MA Qinsheng1,WANG Min2,LIU Yuan1(1.School of Electronic Information,Wuhan University,Wuhan 430079,China; 2.Second Department,Commanding Communications Academy,Wuhan 430010,China)  
In order to improve the overreliance on prior knowledge in the filtering for the network forensics data,a new method for filtering the network forensic data based on the artificial immune network clustering was proposed.Taking the forensic data as the antigens and the dynamic influence-zoned B-cell as the node of artificial immune network respectively,the artificial immune network was evolved in terms of the membership grade between the antigens and artificial immune network and the stimulation of the B-cell.The network forensic data were filtered according to the filter threshold.The results indicated that the algorithm could provided higher data-compression ratios in the case of the rational selection time window and filtering threshold for ensuring an expected detection rate as well as without any priori knowledge.Therefore,the proposed method has a good ability in narrowing the scope of survey data and in the efficiency of forensic analysis.
【Fund】: 高等学校博士学科点专项科研基金(编号:20040486049);; 国家高技术研究发展计划(编号:2002AA1Z1490)
【CateGory Index】: D918.2;TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 1 Hits
1 WANG Yi-miao1,PENG Hong1,CHEN Long1,2(1.Laboratory of Computer Network Security,Chongqing University of Posts & Telecommunications,Chongqing 400065,China;2.State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100080,China);Proactive Forensics Method Based on Intrusion Detection System[J];计算机应用研究;2007-05
【Secondary Citations】
Chinese Journal Full-text Database 4 Hits
1 CHEN Long~(1,2),WANG Guo-yin~1(1.Institute of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China;2.State Key Laboratory of Information Security,Institute of Software of Chinese Academy of Sciences,Beijing 100080,P.R.China);Survey of computer forensics[J];重庆邮电学院学报(自然科学版);2005-06
2 YANG Zhongbao1, YANG Hongyu2, 3 (1. Department of Information Engineering, Changchun Insititue of Technology, Changchun 130021; 2. Department of Computer Science and Engineering, Tianjin University, Tianjin 300072; 3. Software Base, Civil Aviation University of China, Tianjin 300300);Anatomy of Snort Sniffing and Packet Analysis[J];计算机工程;2005-13
3 DING Li-Ping1,3,4+, WANG Yong-Ji1,2 1(Laboratory for Internet Software Technologies, Institute of Software, The Chinese Academy of Sciences, Beijng 100080, China) 2(Laboratory of Computer Science, Institute of Software, The Chinese Academy of Sciences, Beijng 100080, China) 3(Beijing People’s Police College, Beijing 100029, China) 4(Graduate School, The Chinese Academy of Sciences, Beijing 100039, China);Study on Relevant Law and Technology Issues about Computer Forensics[J];软件学报;2005-02
4 JIANG Jian chun,\ MA Heng tai,\ REN Dang en,\ QING Si han(Engineering Research Center for Information Security Technology, The Chinese Academy of Sciences, Beijng 100080, China) E mail: jianchun@ercist.iscas.ac.cn http://www.ercist.ac.cn;A Survey of Intrusion Detection Research on Network Security[J];软件学报;2000-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved