期刊文献+

基于模糊控制及遗传算法的反向选择算法 被引量:1

Negative selection algorithm based on fuzzy control theory and genetic algorithm
在线阅读 下载PDF
导出
摘要 针对基于人工免疫的入侵检测技术中所使用的传统反向选择算法,在面对大量的网络通信数据或具有多个分离特征区间网络通信数据时的无效性,提出了基于模糊控制及遗传算法的反向选择算法。在利用反向选择算法生成抗体时,首先利用模糊控制原理来确定抗体的数量,使得计算机中抗体的数量处于最优,然后为了达到在一定数量抗体时种群的总体免疫力最大,引入了遗传算法来进化种群,最终使得在计算机中抗体的数量得到控制,同时在该数量下种群具有最大的免疫力。 In view of the ineffectivity of the traditional negative selection algorithm of the intrusion detection system based on the artifical immune system when it faces the massive network correspondence data or the data have many separation characteristic sectors, the nega- tive selection algorithm based on the fuzzy control theory and genetic algorithm is proposed. Firstly, the fuzzy control theory is employed to control the immune body quantity when using the negative selection algorithm to get immune body, so that the immune body's quantity is optimum in the computer. Then, the genetic algorithm is introduced to evolve the population in order to maximize the immunity when the quantity of immune body is definite. Accordingly, the quantity of the immune body is under controlled and the immunity of the popu- lation is superior under this quantity.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第21期5193-5194,5288,共3页 Computer Engineering and Design
基金 湖北省教育厅重点科研基金项目(2004D006)。
关键词 人工免疫 入侵检测 反向选择 遗传算法 模糊控制 artificial immune intrusion detection systems negative selection algorithm genetic algorithms fuzzy control
  • 相关文献

参考文献6

  • 1Hofmeyr S,Forrest S.Architecture for an artificial immune system[J].Evolutionary Computation,2000,8(4):443-473.
  • 2焦李成,杜海峰.人工免疫系统进展与展望[J].电子学报,2003,31(10):1540-1548. 被引量:224
  • 3Hamer P K,Williams P D,Gregg H.An artificial immune system architecture for computer security applications[J].IEEE Transactions on Evolutionary Computation,2002,6(3):252-280.
  • 4Aickelin U,Green smith J,Twycross J.Immune system approaches to intrusion detection-a review[C].Catania,Italy:Proc of the Third International Conference on Artificial Immune Systems, 2004:316-329.
  • 5Kim J,Bentley P.An evaluation of negative selection in an artificial[C].San Francisco,CA:Immune System for Network Intrusion Detection. Genetic and Evolutionary Computation Conference,2001:1330-1337.
  • 6Kim J,Bentley P.Towards an artificial immune system for network intrusion detection:An investigation of dynamic clonally selection [C] Honolulu: Proc of the Congress on Evolutionary Computation,2002:1015-1020.

二级参考文献58

  • 1戴汝为,王珏.关于智能系统的综合集成[J].科学通报,1993,38(14):1249-1256. 被引量:52
  • 2戴汝为,王珏.巨型智能系统的探讨[J].自动化学报,1993,19(6):645-655. 被引量:39
  • 3陆德源.现代免疫学[M].上海:上海科学技术出版社,1998.14-16.
  • 4学科交叉和技术应用专门小组(美).学科交叉和技术应用[R].北京:科学出版社,1994.43.
  • 5M N O Sadiku. Artificial Intelligence [ J ]. IEEE Potentials, 1989, 8(2) :35 - 39.
  • 6R J Patton, C J Lopez-Toribio, F J Uppal. Artificial intelligence approaches to fault diagnosis[ A]. IEE Colloquium on Condition Monitoring :Machinety, External Structures and Health (Ref. No. 1999/034)[ C]. London:The Institute of Electrical Eagineers, 1999.5/1 - 5/18.
  • 7R Orwig, H Chen, D Vogel, et al. A multi-agent view of strategic planning using group support systems and artificial intelligence [J]. Group Decision and Negotiation, 1997,6( 1 ) : 37 - 59.
  • 8A Christopher, Welty, G Peter, Selfridge. Artificial intelligence and software engineering: Breaking the toy mold [ J ]. Automated Software Engineering. 1997,4(3) :255 - 270.
  • 9Donald Gillies. Book review: Artificial intelligence and scientific method [ J]. Journal of Intelligent and Robotic Systems. 1998,22( 1 ) :87-95.
  • 10G Sartor, L Karl Branting. Introduction: Judicial Applications of artificial intelligence [J]. Artificial Intelligence and Law, 1998,6(24) : 105- 110.

共引文献223

同被引文献12

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部