Optimization of Real-Valued Self Set in Immunity-based WSN Intrusion Detection

被引:0
作者
Guo, Weipeng [1 ]
Chen, Yonghong [1 ]
Wang, Tian [1 ]
Tian, Hui [1 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
来源
PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND ENGINEERING APPLICATIONS | 2016年 / 63卷
关键词
RNSA; Self-set optimization; Immunity; WSN; IDS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Real-valued negative selection algorithm (RNSA) has been a main algorithm of immunity-based intrusion detection in wireless sensor networks (WSNs). However, the real-valued initial self-set which is used to train detectors has some defects: boundary invasion and overlapping among the self-samples. Detectors trained by the initial self-set may have the problem of boundary invasion, which will resulted false detection, and due to the redundancy of the self-set, the generation efficiency is low. Therefore, the self-set need to be optimized before training stage. In this paper, we proposed a new improved variable threshold self-set optimization algorithm to optimize the self-set before training the detectors based on a new concept of sample's affinity density, which is used to measure the distribution density of the sample. The experiments based on the Iris data set and wireless sensor networks intrusion detection were used to test the effectiveness of the algorithm. The results show that the optimization of self-set can solve the problem of boundary invasion, improve the detector training efficiency, and reduce the false alarm rate of the abnormal detection system.
引用
收藏
页码:120 / 127
页数:8
相关论文
共 12 条
[1]  
Alrajeh N. A., 2013, INT J DISTRIBUTED SE, V9
[2]  
Can O, 2015, INT CONF MODEL SIM
[3]   Sensor networks: Evolution, opportunities, and challenges [J].
Chong, CY ;
Kumar, SP .
PROCEEDINGS OF THE IEEE, 2003, 91 (08) :1247-1256
[4]  
Drozda M., 2007, EV COMP 2007 IEEE C
[5]  
Forrest S., 1994, 2012 IEEE S SEC PRIV
[6]  
Fu RR., 2012, J NANJING U SCI TECH, V1, P137
[7]  
Gao X. Z., 2006, AD LEARN SYST 2006 I
[8]  
GONZALEZ F, 2003, STUDY ARTIFICIAL IMM
[9]  
Liu Y., 2008, IEEE WORLD C COMP IN
[10]   Using artificial neural networks to detect unknown computer worms [J].
Stopel, Dima ;
Moskovitch, Robert ;
Boger, Zvi ;
Shahar, Yuval ;
Elovici, Yuval .
NEURAL COMPUTING & APPLICATIONS, 2009, 18 (07) :663-674