Dissertation > Excellent graduate degree dissertation topics show

Research of Intruding Detection Based on DCA and NSA Algorithm

Author: ZhangChunXiang
Tutor: FuHaiDong
School: Wuhan University of Science and Technology
Course: Computer Software and Theory
Keywords: Intrusion Detection Danger Theory Dendritic cells The definition of danger signals Detection algorithm
CLC: TP393.08
Type: Master's thesis
Year: 2011
Downloads: 35
Quote: 1
Read: Download Dissertation

Abstract


Most of the traditional artificial immune system built on self ─ nonself recognition on the basis of self ─ nonself, however, there is inherently flawed, such as autologous collection is too large, autologous and non-autologous difficult to distinguish. Dangerous theory of the rise in recent years, good to make up for these deficiencies, dangerous theory is that the immune response is not the answer, but for non-self antigens harm the body's antigen respond, do not like the NSA algorithm, as after a large number of training, thereby greatly reducing the size and number of the immune response; before being defined as self, but as time goes by, the body produces harm antigen will acknowledge, thereby reducing the false negative rate; the same time, it does not to non- has but a harmless antigen response, reduce the rate of false positives. Dangerous theory, dendritic cells DCs in hazard identification has played a very important role, it collects a variety of signals in the body, and identify the antigen to the immune cells, this immune mechanism inspired by the typical algorithm is DCA algorithm. Danger theory, however, does not completely negate the SNS model, just its supplement, emphasizing the role of antigen-presenting cells in the immune startup. And especially stressed the professional antigen royalty cells ─ ─ dendritic cells. SNS although there are some flaws, but they stressed that the invading antigen dissidents, most viral invasion characteristics. Most of the invading virus will be there are some differences in the normal data in the computer. Therefore, by autologous set detector obtained by negative selection, can effectively identify the occurrence of invasion. This paper the SNS theory and dangerous theory, design a the new DCA ─ NSA model. It dynamically detects the result of the determination application the NSA in self collection update: for the new model to determine the normal antigen, if the detection result of the NSA detection sub-module for nonself, NSA module error as a self nonself, this time need to be added to the self collection, and enhance the complete collection of self; the abnormal antigen detection for the new model, if the NSA detected as self, self collection infiltrated by the nonself data, it needs to be removed from self, and thus Enhanced self-collection of pure. DCA algorithm in the new model and negative selection algorithm NSA dual detection mechanism, integrated the advantages of the two algorithms for intrusion detection can be more efficient, to guarantee higher detection rate and low false alarm rate.

Related Dissertations

  1. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  2. The Effect of P-selectin on the Maturation of Dendritic Cells from Human Peripheral Blood,R543.5
  3. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  4. Moving target trajectory analysis based Intelligent Traffic Monitoring System,TP277
  5. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  6. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  7. Crucial Role of Dendritic Cells in the Neuro-immune Cross-talk Mechanism,R392
  8. Preparation and Evaluation of Thermosensitive Nanocarrier,R943
  9. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  10. An Intrusion Detection System for High-Speed Networks,TP393.08
  11. Research on the Security in Wireless Sensor Network,TN915.08
  12. Sensitivity Analysis and Application of Orthogonal Weight Function Neural Network,TP183
  13. Research on Hybrid Active Power Filter in Low Voltage System,TN713.8
  14. The Study of Intelligent Intrusion Detection System Based on Neural Network in Linux,TP393.08
  15. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  16. FSVM -based data mining method and its application to intrusion detection research,TP393.08
  17. Web service attack analysis and Security Research,TP393.08
  18. Web-based intrusion detection system logs Design and Implementation,TP393.08
  19. IPv4-IPv6 transition technologies CIDF Based Intrusion Detection System,TP393.08
  20. Intrusion detection based on data mining technology research,TP393.08
  21. Mechanisms based on trust metrics Research and Implementation of Intrusion Detection System,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile