Research of Intrusion Detection Model Based on Artificial Immune System
|School||Qingdao Technological University|
|Course||Applied Computer Technology|
|Keywords||Intrusion Detection Artificial Immune System Mobile-Agent Model Security Modules|
Intrusion Detection is a primary security technology, but the existing Intrusion Detection can’t satisfy the necessary of the security. Intrusion Detection based on Artificial Immune System inspires from the Biological Immune System. It can perfect the existing Intrusion Detection and adapts well to the network which is complex and capricious, which has great research and practicality value.Firstly, the paper expatiate the basic theoretics of the Intrusion Detection Model based on Artificial Immune System. The Intrusion Detection theoretics is discussed, and the conception and arithmetic of Artificial Immune System are concluded and summed up, and the Mobile-Agent technology is expatiated. Meanwhile, the paper deeply analyses that How to apply the Artificial Immune System and Mobile-Agent to Intrusion Detection.Secondly, an Intrusion Detection Model based on Artificial Immune System was improved. The model is composed of four entitys: main-console, subordinate-console, sensor and IDS crunode. Sensor is used to collect the data which needs to be detected. IDS crunode is used to discover the intrusion from the data and deal with the intrusion. Subordinate-console manages the sensor and the IDS crunode in its area, and makes them work cooperative. The main-console is used to manage and cooperat the subordinate-console. The model has some immune characteristic such as distribution, cooperation and self-adaptation.Then, the mathematics description method of the model is defined, and the arithmetic of model is deeply researched which including training arithmetic, identify arithmetic, detection arithmetic and studying arithmetic.The training arithmetic is used to produce the detection-Agent which has detection function. Identify arithmetic is used to identify the doubt-data. Detection arithmetic determines whether the data is intrusion. Study arithmetic is used to study the intrusion.Finally, the security modules of the model are researched. On the base of analysing security demand of the model, a project of the security modules is designed. To the authentication System which is established on PKI, an emulator is implemented to simulate the secure data transmission and entity authentication function of the security modules. The function of the security modules is tested and the effect of the security modules is analyzed.