Study of Immune Control Computing in Immune Detection Algorithm for Information Security

被引:0
|
作者
Zhang, Ya Jing [1 ]
Xue, Yang [2 ]
机构
[1] Yantai Univ, Inst Comp Sci & Technol, Yantai 264005, Shandong, Peoples R China
[2] Shanghai Univ Elect Power, Fac Elect & Automat Engn, Shanghai, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE | 2008年 / 5227卷
关键词
immune control; immune detection; information security; vaccines;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on research for anomaly detection and immune control mechanism in the biological immune principles, a method of immune control computing is introduced in immune detection. Such problems as immune detection model and immune memory are discussed. The experiments that are in the area of intrusion detection are made. Shown by experiments, the algorithm joined immune control computing provides a dynamitic detecting way and keeps stability of detection. Its detecting efficiency is increased obviously.
引用
收藏
页码:951 / +
页数:2
相关论文
共 50 条
  • [1] An investigation of immune match, immune memory and complement operator in immune detection algorithm
    Zhang, Ya-jing
    Leng, Hui-wen
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 3618 - +
  • [2] Information Security: Artificial Immune Detectors in Neural Networks
    Fatima, Huda
    Al-Turki, Saleh Mohammed
    Pradhan, Sateesh Kumar
    Dash, G. N.
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [3] Applied artificial immune on P2P network virus detection technology for information security
    Qiao Peili
    Sun Wanting
    2014 9TH INTERNATIONAL FORUM ON STRATEGIC TECHNOLOGY (IFOST), 2014, : 216 - 221
  • [4] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174
  • [5] Research on Information Security Situation Assessment of Urban Rail Train Control System Based on Artificial Immune System
    Li Q.
    Bu B.
    Zhao J.
    Li G.
    Zhongguo Tiedao Kexue/China Railway Science, 2024, 45 (03): : 128 - 137
  • [6] CONSTRUCTION METHOD OF INFORMATION SECURITY DETECTION BASED ON CLUSTERING ALGORITHM
    Chen, Shaobo
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (06): : 5295 - 5301
  • [7] An investigation of immune detection algorithm with vaccine operator and fuzzy match
    Zhang, YJ
    Leng, HW
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3943 - 3948
  • [8] Analysis of cloud computing and information security
    Kenan, Wang
    Shao, Qian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3810 - 3813
  • [9] Information Security in the Era of "Cloud Computing"
    An, Jing
    Zhang, Lei
    You, Chunlan
    Li, Xuehu
    2017 2ND ISSGBM INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND SOCIAL SCIENCES (ISSGBM-ICS 2017), 2017, 78 : 81 - 84
  • [10] Study on risk assessment of information security based on cloud computing model
    Wu, Guo-Hua
    Liu, Yu-Cheng
    Qi, Kai-Kai
    Wang, Peng
    Xu, Jian-Da
    Proceedings of the 2016 International Conference on Engineering and Advanced Technology, 2016, 82 : 91 - 95