期刊文献+

基于模糊思想生成最有效检测器集的变阈值免疫算法 被引量:1

Adjustable Threshold Immune Algorithm of Creating Most Effective Detector Set Based on Fuzzy Idea
原文传递
导出
摘要 检测器集是免疫阴性选择算法的关键所在,它直接影响到系统的效率和准确度,因此,如何确定一个最有效检测器集合是提高阴性选择算法性能的关键步骤。利用模糊思想,在定义了模糊相似度与背离度的基础上,提出了一种生成最有效检测器集的变阈值免疫阴性选择算法。该算法匹配阈值可变,采用调整匹配阈值的方法大幅降低黑洞数量;算法确定了一个最有效的检测器集合,有效去除了检测器集中的冗余现象。仿真结果表明,该算法生成的检测器集检测范围较大,空间覆盖率高,黑洞数量大幅下降,算法具有较强的鲁棒性。 Detector set is where the shoe pinches in immune negative selection algorithm, it affects efficiency and veracity of system directly, so how to confirm the most effective detector set is a key step to improve negative selection algorithm capability. Fuzzy idea was used to bring forward an adjustable threshold immune negative selection algorithm of creating the most effective detector set based on defining fuzzy similarity and deviation. The matching threshold is adjustable in this algorithm and the number of holes can be reduced clearly through adjusting matching threshold, the algorithm confirms a most effective detector set and eliminates redundancy phenomenon in detector set effectively. The simulation results show that the detector set generated by the algorithm can detect bigger range, the rate of space coverage is high and the number of holes declines clearly, and the algorithm has better robustness.
出处 《系统仿真学报》 CAS CSCD 北大核心 2008年第17期4596-4600,共5页 Journal of System Simulation
基金 国家自然科学基金资助项目(60305007)
关键词 阴性选择 模糊相似度 检测器集 黑洞 negative selection fuzzy similarity detector set holes
  • 相关文献

参考文献7

  • 1Forrest S, Hofmeyr S A, Somayaji A, Longstaff T A. Asense of self for Unix [C]// Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA. USA: IEEE, 1996: 120-128.
  • 2Forrest S, Perelson A S, Allen L, Cherukuri R. Self nonself discrimination in a computer. [C]// Proceedings of the 1994 IEEE Symposium on Security and Privacy, Los Alamitos, CA. USA: IEEE, 1994: 202-212.
  • 3D'haesseleer E Further efficient algorithms for generating antibody string [R]// The University of New Mexico, Albuquerque NM: Technical Report CS95-031 1995. USA: The University of New Mexico, Albuquerque NM, 1995.
  • 4Fernando Esponda, S Forrest. Detector coverage under the r-contiguous bits matching rule [R]//Techical Rrport TR-CS-2002-03. USA: Department of Computer Science, University of New Mexico, 2002.
  • 5张海英,管洪娜,潘永湘.一种改进的阴性选择免疫算法[J].西安理工大学学报,2005,21(3):306-309. 被引量:9
  • 6张剑,何华灿,赵敏.免疫计算中复合检测集生成算法[J].计算机工程与应用,2004,40(28):5-7. 被引量:6
  • 7吴开兴,王立功,郑凤.免疫机制入侵检测技术中检测器漏洞的研究[J].计算机与现代化,2005(4):50-53. 被引量:2

二级参考文献20

  • 1张海英,浦磊,潘永湘.一种自适应快速关联规则挖掘算法[J].西安理工大学学报,2004,20(4):404-407. 被引量:2
  • 2Fernando Esponda, S Forrest. Detector coverage under the r-contiguous bits matching rule[R].Technical Report TR-CS-2002-03 ,Department of Computer Science,University of New Mexico,2002
  • 3P D'haeseleer. Further Efficient Algorithms for Generating Antibody Strings[R].Technical Report CS-95-03 ,Department of Computer Science,University of New Mexico,1995
  • 4Jungwon Kim,Peter Bentley. Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection[C].In:Genetic and Evolutionary Computation Conference, 1999
  • 5S Forrest,A S Perelson,L Aleen et al.Self-nonself discrimination in a computer[C].In:Proceedings of IEEE symposium on research in security and privacy, 1994:202~212
  • 6P D'haeseleer,S Forrest,P Helman. An immunological approach to change detection:algorithms,analysis,and implications[C].In:Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA, 1996:110~ 119
  • 7P D'haeseleer. A change-detection method inspired by the immune system:theory,algorithms,and techniques[R].Technical Report CS-95-06,Department of Computer Science,University of New Mexico, 1995
  • 8P Helman,S.Forrest. An efficient algorithms for generating random antibody strings[R].Technical Report CS-94-07, Department of Computer Science,University of New Mexico, 1994
  • 9P D'haeseleer,S Forrest,P Helman. An immunological approach to change detection Theoretical Results[C].In :the 9th IEEE Computer Security Foundations Workshop, 1996
  • 10Steven Andrew Hofmeyr. An immulogical model of distributed detection and its application to computer security[D].Phd Thesis University of NewMexico,2000.

共引文献11

同被引文献11

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部