Design and Implementation of an Immune Algorithm for IDS

被引:0
作者
Yao Xing [1 ]
Lu Jiaxing [1 ]
Guo Fan [1 ]
Yu Min [1 ]
机构
[1] JiangXi Normal Univ, Dept Informat & Engn, Nanchang City 330022, Peoples R China
来源
PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II | 2010年
关键词
immune algorithm; negative selection; clonal selection; r-bit consecutive match;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
According to immune principle, this paper designs an immune algorithm applied to intrusion detection system. The algorithm mainly includes negative selection algorithm, clonal selection algorithm and r-bit consecutive matching algorithm. In order to reduce the number of inevitable "black hole", this paper used r-bit variable matching algorithm, and used a method of fast training data set to shorten the training time of data, The experimental results showed that the algorithm is an effective immune algorithm.
引用
收藏
页码:1054 / 1059
页数:6
相关论文
共 13 条
  • [1] A sense of self for unix processes
    Forrest, S
    Hofmeyr, SA
    Somayaji, A
    Longstaff, TA
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 120 - 128
  • [2] JIANGQIANG, 2007, J HARBIN ENG U, P28
  • [3] KIM J, 1999, GECCO99 ORL FLOR
  • [4] LU ZW, INFORM SECURITY
  • [5] LUO YD, 2008, COMPUTER SCI, P149
  • [6] PAN ZS, 2003, DATA ACQUISITION PRO
  • [7] SHI ZZ, 2002, KNOWLEDGE DISCOVERY, P21
  • [8] SONG WJ, 2008, SCI TECHNICAL INFORM, P10
  • [9] WANG DW, 2008, COMPUTER ENG APPL, V44
  • [10] WILLIAM PD, CD IS COMPUTER IMMUN