期刊文献+

Research on a randomized real-valued negative selection algorithm

Research on a randomized real-valued negative selection algorithm
下载PDF
导出
摘要 A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it can produce a good estimate of the optimal number of detectors needed to cover the non-self space, and the maximization of the non-self coverage is done through an optimization algorithm with proven convergence properties. Experiments are performed to validate the assumptions made while designing the algorithm and to evaluate its performance. A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it can produce a good estimate of the optimal number of detectors needed to cover the non-self space, and the maximization of the non-self coverage is done through an optimization algorithm with proven convergence properties. Experiments are performed to validate the assumptions made while designing the algorithm and to evaluate its performance.
出处 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第6期745-747,共3页 哈尔滨工业大学学报(英文版)
基金 Sponsored by the National Natural Science Foundation of China ( Grant No. 60671049 ), the Subject Chief Foundation of Harbin ( Grant No.2003AFXXJ013), the Education Department Research Foundation of Heilongjiang Province(Grant No.10541044,1151G012) and the Postdoctor Founda-tion of Heilongjiang(Grant No.LBH-Z05092).
关键词 intrusion detection immune systems negative selection algorithm 人工免疫系统 进化非选择算法 函数优化 求解性能 NSA
  • 相关文献

参考文献5

  • 1GREENSMITH J,AICKEL I U,TWYCROSS J.Detecting danger applying a novel immunological concept to intrusion detection systems[].thInternational Conference in A- daptive Computing in Design and Manufacture.2004 被引量:1
  • 2HOFMEYR S,FORRESTS.Immunity by design: an arti- ficial immune system[].Proceedings of the Genetic and Evolutionary Computation Conference (GECCO).1999 被引量:1
  • 3KIM J,BENTLEY P J.Toward an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection[].Proceedings of the Congress on Evolutionary Computation CEC.2002 被引量:1
  • 4ZHANG Fengbin,YANG Yongtian,WANG Shengwen.A- nomaly detection using real-valued negative selection[].ISTM’: th International Symposium on Test and Measurement.2005 被引量:1
  • 5DASGUPTA D,GONZALEZ F.An immunity-based tech- nique to characterize intrusion in computer networks[].IEEE Transactions on Evolutionary Computation.2002 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部