期刊文献+

基于免疫遗传的软件衰退检测算法 被引量:1

An Immuno-Genetic-Based Approach for Software Aging Detection
下载PDF
导出
摘要 本文吸取了免疫学的灵感,提出了一种新的方法来验证软件衰退的出现,也就是检测软件运行中的性能异常。这种方法结合了阴性选择算法和遗传算法,使用模糊逻辑产生模糊集来区分正常和异常的性能状态,使用了阴性选择算法充当过滤器来消除不合法的检测子、降低搜索空间。最后使用 Mackey-Glass 时间序列产生的数据集和知名的 UCI 数据库的一组数据进行了仿真实验,来验证本方法的可行性和有效性。 This paper presents a new approach inspired by immunology for validation of software aging and detection of system performance anomaly. It combines the negative selection algorithm and genetic algorithm, and generates fuzzy sets with fuzzy logic to code chromosome. The negative selection algorithm serves as a filter to eliminate invalid detectors and reduce search space. Experiments with synthetic and real data sets are performed to show the applicability of the proposed approach.
出处 《计算机科学》 CSCD 北大核心 2006年第1期167-169,180,共4页 Computer Science
基金 基金项目:国家自然科学基金(No.60273035)。
关键词 软件衰退 异常检测 阴性选择 遗传算法 检测算法 软件运行 免疫遗传 衰退 选择算法 模糊逻辑 Software aging, Anomaly detection, Negative selection, Genetic algorithm
  • 相关文献

参考文献11

  • 1Garg S,Moorsel A V. A Methodology for Detection and Estimalion of Software Aging[A]. In:Proe. of 9th Intnl Symposium on Software Reliability Engineering[C],Paderborn,Germany, Nov.1998. 282 -292.
  • 2Hansen J P,Siewiorek D P. Models for time coalescence in event logs[A]. In: Proc. of 22nd IEEE Intl Symposium on Fault-Toler-ant Computing[C],1992. 221 -227.
  • 3Iyer R K, Young L T. Automatic recognition of intermittent failures:An experimental study of field data[J]. IEEE Transactions on Computers, 1990,39(4) : 525-537.
  • 4Ye Nong, Chen Qiang. An Anomaly Detection Technique Based on A Chi square Statistic for Detecting Intrusions into Information Systems[J]. Quality and Reliability Engineering International,2001,17(2):105 - 112.
  • 5Lane T, Brodley C E. An Application of Machine Learning to Anomaly Detection[A]. In: Proceedings of the 20th National Information Systems Security Conference [C], Baltimore, MD. Ocl.1997. 366-377.
  • 6Forrest S. Self-nonself discrimination in a computcr[A]. In: Proceedings of IEEE Syrup on Research in Security and Privacy[C],1994. 202-212.
  • 7McCoy D F, Devarajan V, Artificial immune systems and aerial image segmentation[A]. In: Proceedings of IEEE International Conference on Systems, Man,and Cybemetics[C]. Orlando,Florida, 1997.867-872.
  • 8Kim J ,Bentley P. Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator[A]. In:Proceedings of on Evolutionary Computation (CEC-2001) [C], Seaul, Korea, 2001.1244-1252.
  • 9Kim J,Bentley P. An evaluation of negative selection in an artificial immune system for network intrusion detection [A]. In: Proceedings of the Genetic and Evolutionary Computation Conference(GECCO-2001) [C],San Francisco, California, USA, 2001. 1330-1337.
  • 10Caudell T,Newman D. An adaptive resonance architecture to define normality and detect novelties in time series and databases[A]. In:Proceedings of(Portland,Oregon)[C],1993. 166 - 176.

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部