期刊文献+

一种改进的动态克隆选择算法在木马检测中的应用

Application of an Improved Dynamic Clonal Selection Algorithm in Trojan Detection
下载PDF
导出
摘要 传统的克隆选择算法在检测效率、实时性等问题上都有不足和缺陷。在传统克隆选择算法交叉变异过程之后再次进行阴性选择,以避免交叉变异时产生和自体匹配的新个体,防止自体免疫的发生。在变异时采取概率与亲和度大小成反比的机制,保证检测器充满多样性。引入循环补充机制,动态更新检测器,增强全局寻优能力。 The traditional clonal selection algorithm has defects on detection accuracy and real-time. Makes another negative selection after a crossover and mutation process of traditional clonal se- lection algorithm. This can avoid producing new individuals matching autologous, prevent the occurrence of autoimmune. After that, during the variation process, takes a mechanism in which probability is inversely proportional to the degree of affinity, to ensure the diversity of detector. And introduces an additional circulation mechanism to dynamically update detectors and en- hance the ability of global optimization.
作者 包晖
机构地区 河南工业大学
出处 《现代计算机》 2012年第22期6-8,共3页 Modern Computer
关键词 克隆选择 木马检测 人工免疫 Clonal Selection Trojan Detection Artificial Immune
  • 相关文献

参考文献4

二级参考文献32

  • 1黄萍,李之棠.应用支持向量机实现分布式入侵检测[J].华中科技大学学报(自然科学版),2003,31(S1):214-217. 被引量:2
  • 2李代平,罗寿文,张信一,方海翔.一个网络并行计算新平台[J].计算机工程与设计,2005,26(1):24-26. 被引量:3
  • 3郑广,何新华,白汉利.应用程序入侵检测系统设计[J].计算机工程与设计,2005,26(5):1307-1310. 被引量:5
  • 4王晋,李德全,冯登国.一种基于Agent的自适应的分布式入侵检测系统[J].计算机研究与发展,2005,42(11):1934-1939. 被引量:4
  • 5Ayara M,Timmis J,de Lemos R,et al,Negative selection:how to generate delectors[C]//the 1st International Conference on Artificial Immune Systems, 2002.
  • 6Hofmeyr S A,Forrest S.Architecture for an artificial immune system[J].Evolutionary Computation Journal,2000,8:443-473.
  • 7Kim J,Bentley P J.A model of gene library evolution in the dynamic clonal selection algorithm[C]//Proceedings of the First International Conference on Artificial Immune System,Canterbury,2002: 57-65.
  • 8Barton P Miller,David Koski,Cjin Pheow Lee,etc.Fuzz revisited:A re-examination of the reliability of UNIX utilities and services [R].Technical report,CS-TR -95-1268,Computer Sciences Department,University of Wisconsin,1995.
  • 9W Lee,S J Stolfo.Data mining approaches for intrusion detection [A].In Proceed ings of the 7th USENIX Security Symposium [C].San Antonio,Texas,USA:1998.
  • 10John P Wack,Lisa J Carnahan.Keeping your site comfortably secure: An Introductio n to Internet Firewalls [DB/OL].NIST Special Publication 800-10,U.S.DEPARTMENT OF COMMERCE. .

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部