期刊文献+

树突细胞算法及其理论研究 被引量:2

On Dendritic Cell Algorithm and its Theoretical Investigation
下载PDF
导出
摘要 树突细胞算法(DCA)是受先天性免疫系统中树突细胞(DCs)功能的启发而开发的算法,它已被成功运用于许多计算机安全相关领域。但是对DCA理论方面的分析工作很少,对算法大多数理论方面的研究也较少出现。而其它的人工免疫算法如负选择算法、克隆选择算法在理论方面的研究工作却出现在很多文献中。因此对DCA算法进行相似的理论分析,确定算法的运行时间复杂度,揭示其它算法的属性就显得非常重要。根据算法执行的3个阶段,通过引入3个运行时间变量实现对DCA算法的理论分析。标准DCA算法取得的运行时间复杂度下界为Ω(n),而在最坏情况下的时间复杂度为O(n2)。另外,如果利用"分片"方法实现DCA的在线分析组件,则算法的运行时间复杂度可以改进为O(max(nN,nδ))。 Dendritic cell algorithm(DCA)is inspired by functions of the dendritic cells(DCs)of the innate immune system,and has been successfully applied to numerous security-related problems.However,theoretical analysis of the DCA has barely been performed,and most theoretical aspects of the algorithm have not yet been revealed.Other immune inspired algorithms,such as negative and clonal selection algorithms,are theoretically presented in many literatures.As a result,it is important to conduct a similar theoretical analysis of the DCA,and determine its runtime complexity and other algorithmic properties in line with other artificial immune algorithms.Theoretical analysis was implemented via introduction of three runtime variables in terms of three phases of the algorithm.The standard DCA achieves a lower bound ofΩ(n)runtime complexity and an upper bound of O(n2)runtime complexity under the worst case.In addition,the algorithm's runtime complexity can be improved to O(max(nN,nδ))by using segmentation approach for online analysis component.
出处 《计算机科学》 CSCD 北大核心 2015年第2期131-133,156,共4页 Computer Science
基金 国家自然科学基金(61240023)资助
关键词 树突细胞算法 形式化描述 运行时间复杂度 Dendritic cells algorithm Formal description Runtime complexity
  • 相关文献

参考文献16

  • 1Greensmith J.The Dendritic Cell Algorithm[D].Nottingham:University of Nottingham,2007.
  • 2Leandro N,De Castro J T.Artificial Immune Systems:A New Computational Intelligence Approach[M].London:Springer-Verlag,Inc,2002.
  • 3Greensmith U A.Dendritic Cells for SYN Scan Detection[C]∥Proceedings of the Genetic and Evolutionary Computation Conference (GECCO2007).London,UK:ACM Press,2007:49-56.
  • 4Al-Hammadi Y,Aickelin U,Greensmith J.DCA for Bot Detec-tion[C]∥Proceedings of the IEEE World Congress on Computational Intelligence (WCCI 2008).Berlin Heidelberg:Springer-Verlag,2008:1807-1816.
  • 5Oates R,J G,Aickelin U,et al.The Application of a Dendritic Cell Algorithm to a Robotic Classifier[C]∥Proceedings of the 6th International Conference on Artificial Immune (ICARIS 2007).2007:204-215.
  • 6Greensmith J,Feyereisl J,Aickelin U.The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms[J].Evolutionary Intelligence,2008,1(2):85-112.
  • 7Stibor T R O,Kendall G,et al.Geometrical insights into the dendritic cell algorithm[C]∥Proc.of the Genetic and Evolutionary Computation Conference (GECCO).2009:1275-1282.
  • 8Oates R.The Suitability of the Dendritic Cell Algorithm for Robotic Security Applications[D].Nottingham:School of Computer Science,University of Nottingham,2010.
  • 9Feng Gu,Julie G,Uwe A.The Dendritic Cell Algorithm for In-trusion Detection[J].Bio-Inspired Communications and Networking,IGI Global,2011:84-102.
  • 10Greensmith J,U A.The Deterministic Dendritic Cell Algorithm[C]∥Proceedings of the 7th International Conference on Artificial Immune Systems (ICARIS 2008).Phuket,Thailand.Lecture Notes in Computer Science Volume 5132,2008:291-302.

同被引文献27

  • 1LIAO H, LIN C, LIN Y, et al. Intrusion detection system: a comprehensive review[J] . Journal of Network and Computer Applications, 2013, 36(1): 16-24.
  • 2KREUTZ D, RAMOS F M V, ESTEVES VERISSIMO P, et al. Software-defined networking: a comprehensive survey[J]. Proceedings of the IEEE, 2015, 103(1): 14-76.
  • 3AICKELIN U, DIPANKAR D. FENG G. Artificial immune systems[M]. Berlin: Springer, 2014: 187-211.
  • 4HUA Y, LI T, HU X, et al. A survey of artificial immune system based intrusion detection[J]. The Scientific World Journal, 2014, 2014(3): 156790.
  • 5SALMON H M, FARIAS C M D, LOUREIRO P, et al. Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques[J]. International Journal of Wireless Information Networks, 2013, 20(1): 39-66.
  • 6FENG G, GREENSMITH J, AICKELIN U. The dendritic cell algorithm for intrusion detection[M]. IGI Global: Bio-Inspired Communications and Networking, 2011: 84-102.
  • 7ZONG W, HUANG G, CHEN Y. Weighted extreme learning machine for imbalance learning[J]. Neurocomputing, 2013, 101(3): 229-242.
  • 8LIN W J, CHEN J J. Class-imbalanced classifiers for high-dimensional data[J]. Briefings in Bioinformatics, 2013, 14(1): 13-26.
  • 9JAEHAK Y, LEE H, KIM M S, et al. Traffic flooding attack detection with SNMP MIB using SVM[J]. Computer Communications, 2008, 31(17): 4212-4219.
  • 10VLADIMIR V. The nature of statistical learning theory[M]. Berlin: Springer Science & Business Media, 2000: 2-6.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部