期刊文献+

基于免疫的检测漏洞问题研究

Study on leaks of detection based on immunity
下载PDF
导出
摘要 针对已有实值非选择算法中检测漏洞问题,提出一种改进的算法提高对检测漏洞的覆盖。算法基于可变长实值检测器实现,主要思想是把自体样本分为边界自体样本和非边界自体样本。在检测器的生成过程中,鉴别和记录边界自体样本;在对新样本的检测过程中,检测是否匹配边界自体。通过人工合成数据集2DSyntheticData和实际Iris数据集对算法进行了验证。实验结果表明,算法检测率较高,在覆盖自体和非自体边界处的漏洞方面明显优于已有的算法。 For the leaks of the available real-valued negative selection algorithm, an improved negative selection algorithm is proposed. The algorithm is based on variable-length real-valued detectors. The samples are divided into boundary samples and non-boundary samples. In the detector generation process, it identifies and records the boundary samples. While new samples is tested, whether the detectors match the boundary samples are recorded. Detailed realization and advantages of the algorithm are given. The experiments of synthetic and real data sets(Iris data set and biomedical data set)are done to test the algorithm. The results show that the algorithm has higher detection rate and need less detector numbers. It is superior to available algorithms in coverage of leaks at boundary of self and non-self.
作者 何燚 姜建
出处 《计算机工程与应用》 CSCD 2012年第2期103-105,共3页 Computer Engineering and Applications
关键词 人工免疫 非选择算法 漏洞 检测器 artificial immune system negative selection algorithm leak detectors
  • 相关文献

参考文献9

  • 1Bereta M,Burczy'nski %Comparing binary and real-valued coding in hybrid immune algorithm for feature selection and classification of signals[J].Eng Appl Artif Intell, 2007,20 (5) : 571-585.
  • 2Gonzalez F, Dasgupta D, Nino L F.A Randomized real-valued negative selection algorithm[C]//ICARIS-03.2005.
  • 3Zhou Ji, Dasgupta D.Real-valued negative selection algorithm with variable-sized detectors[C]//LNCS 3102 :Proceedings of GECCO, Berlin: Springer, 2007: 287-298.
  • 4Ji Z, Dasgupta D.Applicability issues of the real-valued negative selection algorithms[C]//Genetic and Evolutionary Computation Conference(GECCO 2006),Seattle,Washington, 8-12 July 2007: 111-118.
  • 5Balthrop J, Esponda F, Forrest S,et al.Coverage and generalization in an artificial immune system[J].Evolutionary Computation, 2006, 12:34-43.
  • 6魏春英.基于免疫原理的入侵检测中的漏洞研究[J].计算机工程,2009,35(11):146-147. 被引量:3
  • 7Balachandran S, Dasgupta D, Nino F, et al.A framework for evolving multi-shaped detectors in negative selection[J].Artificial Intelligences, 2007,8 : -473.
  • 8Columbia University.2DSyntheticData[EB/OL].[2010-03 12].http:// www.zhouji.net/prof/2DSyntheticData.zip.
  • 9StatLib Datasets Archive[EB/OL].http://lib.stat.cmu.edu//dataset/.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部