期刊文献+

Research on a randomized real-valued negative selection algorithm

Research on a randomized real-valued negative selection algorithm
下载PDF
导出
摘要 A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it can produce a good estimate of the optimal number of detectors needed to cover the non-self space, and the maximization of the non-self coverage is done through an optimization algorithm with proven convergence properties. Experiments are performed to validate the assumptions made while designing the algorithm and to evaluate its performance. A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it can produce a good estimate of the optimal number of detectors needed to cover the non-self space, and the maximization of the non-self coverage is done through an optimization algorithm with proven convergence properties. Experiments are performed to validate the assumptions made while designing the algorithm and to evaluate its performance.
出处 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第6期745-747,共3页 哈尔滨工业大学学报(英文版)
基金 Sponsored by the National Natural Science Foundation of China ( Grant No. 60671049 ), the Subject Chief Foundation of Harbin ( Grant No.2003AFXXJ013), the Education Department Research Foundation of Heilongjiang Province(Grant No.10541044,1151G012) and the Postdoctor Founda-tion of Heilongjiang(Grant No.LBH-Z05092).
关键词 人工免疫系统 进化非选择算法 函数优化 求解性能 NSA intrusion detection immune systems negative selection algorithm
  • 相关文献

参考文献5

  • 1GREENSMITH J,AICKEL I U,TWYCROSS J.Detecting danger applying a novel immunological concept to intrusion detection systems[].thInternational Conference in A- daptive Computing in Design and Manufacture.2004
  • 2HOFMEYR S,FORRESTS.Immunity by design: an arti- ficial immune system[].Proceedings of the Genetic and Evolutionary Computation Conference (GECCO).1999
  • 3KIM J,BENTLEY P J.Toward an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection[].Proceedings of the Congress on Evolutionary Computation CEC.2002
  • 4ZHANG Fengbin,YANG Yongtian,WANG Shengwen.A- nomaly detection using real-valued negative selection[].ISTM’: th International Symposium on Test and Measurement.2005
  • 5DASGUPTA D,GONZALEZ F.An immunity-based tech- nique to characterize intrusion in computer networks[].IEEE Transactions on Evolutionary Computation.2002

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部