...
首页> 外文期刊>Parallel Computing >An artificial immune based intrusion detection model for computer and telecommunication systems
【24h】

An artificial immune based intrusion detection model for computer and telecommunication systems

机译:用于计算机和电信系统的基于人工免疫的入侵检测模型

获取原文
获取原文并翻译 | 示例
           

摘要

Recent years have seen a growing interest in computational methods based upon natural phenomena with biologically inspired techniques, such as cellular automata, immune human systems, neural networks, DNA and molecular computing. Some of these techniques are classified under the realm of a general paradigm, called bio-computing. In this paper, we propose a security system for fraud detection of intruders and improper use of both computer system and mobile telecommunication operations. Our technique is based upon data analysis inspired by the natural immune human system. We show how immune metaphors can be used efficiently to tackle this challenging problem. We also describe how our scheme extracts salient features of the immune human system and maps them within a software package designed to identify security violations of a computer system and unusual activities according to the usage log files. Our results indicate that our system shows a significant size reduction of the logs file (i.e., registration of each log activity), and thereby the size of the report maintained by the computer system manager. This might help the system manager to monitor and observe unusual activities on the machine hosts more efficiently, as they happen, and can act accordingly before it is too late. Last but not least, we propose an intrusion and fraud detection model based upon immune human analogy for mobile phone operations. We discuss our model and present its specification using the Z Language.
机译:近年来,人们对基于自然现象和生物启发技术的计算方法越来越感兴趣,例如细胞自动机,人体免疫系统,神经网络,DNA和分子计算。其中一些技术被归类为一种称为生物计算的一般范式。在本文中,我们提出了一种安全系统,用于入侵者的欺诈检测以及计算机系统和移动电信运营的不当使用。我们的技术基于受自然免疫人类系统启发的数据分析。我们展示了如何有效地利用免疫隐喻来解决这一具有挑战性的问题。我们还将描述我们的方案如何提取免疫人类系统的显着特征并将其映射到旨在根据使用情况日志文件识别计算机系统的安全违规和异常活动的软件包中。我们的结果表明,我们的系统显示出日志文件的大小显着减少(即,每个日志活动的注册),从而减少了计算机系统管理员维护的报告的大小。这可能有助于系统管理员更有效地监视和观察计算机主机上的异常活动(如果它们发生了),并且可以在为时已晚之前采取相应的措施。最后但并非最不重要的一点是,我们提出了一种基于免疫人类类比的手机操作入侵和欺诈检测模型。我们讨论模型并使用Z语言介绍其规范。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号