期刊文献+

免疫算法在模糊检测器生成中的应用 被引量:1

Application of immune algorithm to generate fuzzy-detector in intrusion detection
下载PDF
导出
摘要 目前入侵检测中传统否定选择算法忽略了正常和异常模式之间的模糊界限而造成了检测效率低下,以及生成的检测器数量冗繁,用在非我模式识别时计算复杂度相当高。针对这些缺陷,重点研究了在入侵检测系统中定义模糊检测规则的重要性,并提出利用免疫算法的优化搜索性能来进化模糊检测器的方法。实验结果表明,该方法生成的检测器能够允许更简洁的自我和非我的表示方式,降低了检测规则的脆弱性,检测效果较好。 The neglect of the fuzzy limit between the self and nonselfgave the poor efficiency of detection, where traditional negative selection algorithm is used in intrusion detection. And the computational complexity by using large numbers of detectors is too high. Aimed at these flaws, the necessary of fuzzy detection rules, and a hybrid approach are proposed which uses the searching performance of immune algorithm to generate fuzzy-detectors. The results ofthe experirnent prove that fuzzy rules express the self/nonselfs compactly, reduce the fi-angibility of detectors greatly and have an exciting feature.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第10期2496-2498,共3页 Computer Engineering and Design
关键词 入侵检测 模糊界限 免疫算法 优化搜索 模糊检测器 脆弱性 intrusion detection fuzzy limit immune algorithm optimization search fuzzy detector frangibility
  • 相关文献

参考文献4

  • 1Gonzalez F, Dasgupta D,Nino L F.A randomized real negative selection algorithm [D].ICARIS-03,2003.
  • 2段友祥,王海峰,满成城.模糊逻辑在基于AIS的主机入侵检测中的应用[J].计算机工程与设计,2005,26(9):2540-2542. 被引量:6
  • 3Fabio Gonzalez.A study of artificial immune systems applied to anomaly detection [D]. Memphis: The University of Memphis, 2003.
  • 4Jonatan Gomez C,Fabio Gonzalez.An immune-fuzzy approach to anomaly detection[C].IEEE International Conference Fuzzy System,2003:1219-1224.

二级参考文献6

  • 1Jonatan Gomez C, Fabio Gonzalez. An immuno-fuzzy approach to anomaly detection [C]. IEEE International Conference on Fuzzy System, 2003.1219-1224.
  • 2Dasgupta. Artificial immune system(AIS) research in the last five years[J]. Evolutional Computation Journal,2003,(3): 278-280.
  • 3J Z. Multilevel negative/positive selection in real-valued space[R]. Research Report,UM, 2003-12-21.
  • 4Gomez J, Dasgupta D. Evolving fuzzy classifiers for intrusion detection[J]. Proceedings of the 2002 IEEE Workshop on Information Assurance,2002, 6(3):321-323.
  • 5Gonzalez F, Dasgupta D, Nino L F. A randomized real valued negative selection algorithm[D]. ICARIS-03, 2003.
  • 6Hofmeyr S,Forrest S.Architecture for and artificial immune system[J].Evolutionary Computation, 2000,8(4): 443-473.

共引文献5

同被引文献10

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部