The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may hav...The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may have the problem of boundary holes between self and nonself regions, and the generation efficiency is low, so that, the self set needs to be optimized before generation stage. This paper proposes a self set optimization algorithm which uses the modified clustering algorithm and Gaussian distribution theory. The clustering deals with multi-area and the Gaussian distribution deals with the overlapping. The algorithm was tested by Iris data and real network data, and the results show that the optimized self set can solve the problem of boundary holes, increase the efficiency of detector generation effectively, and improve the system's detection rate.展开更多
We introduce the probability properties of random recursive sets systematically in this paper. The main contents include convergence, zero\|one law and support of distribution and self\|similarity.Hutchinson construct...We introduce the probability properties of random recursive sets systematically in this paper. The main contents include convergence, zero\|one law and support of distribution and self\|similarity.Hutchinson constructed a class of strictly self\|similar sets and got many important results on fractal properties.Graf investigated the fractal properties of a special statistically self\|similar set. We have investigated various self\|similar sets and their probability properties and fractal properties.\;展开更多
Immune-based intrusion detection approaches are studied. The methods ofconstructing self set and generating mature detectors are researched and improved. A binary encodingbased self set construction method is applied....Immune-based intrusion detection approaches are studied. The methods ofconstructing self set and generating mature detectors are researched and improved. A binary encodingbased self set construction method is applied. First, the traditional mature detector generatingalgorithm is improved to generate mature detectors and detect intrusions faster. Then, a novelmature detector generating algorithm is proposed based on the negative selection mechanism.According to the algorithm, less mature detectors are needed to detect the abnormal activities inthe network. Therefore, the speed of generating mature detecotrs and intrusion detection isimproved. By comparing with those based on existing algorithms, the intrusion detection system basedon the algorithm has higher speed and accuracy.展开更多
In this paper, an equivalent condition for the self similar sets on the real line to have best coverings is given. As a result, it partly gives answer to the conjecture which was posed by Zhou and Feng [Zhou, Z. L., F...In this paper, an equivalent condition for the self similar sets on the real line to have best coverings is given. As a result, it partly gives answer to the conjecture which was posed by Zhou and Feng [Zhou, Z. L., Feng, L.: Twelve open problems on the exact value of the Hausdorff measure and on topological entropy: A brief survey of recent results. Nonlinearity, 17(2), 493-502 (2004)].展开更多
基金Supported by the National Natural Science Foundation of China (No. 60671049, 61172168)and Graduate Innovation Project of Heilongjiang (No. YJSCX2011-034HLI)
文摘The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may have the problem of boundary holes between self and nonself regions, and the generation efficiency is low, so that, the self set needs to be optimized before generation stage. This paper proposes a self set optimization algorithm which uses the modified clustering algorithm and Gaussian distribution theory. The clustering deals with multi-area and the Gaussian distribution deals with the overlapping. The algorithm was tested by Iris data and real network data, and the results show that the optimized self set can solve the problem of boundary holes, increase the efficiency of detector generation effectively, and improve the system's detection rate.
文摘We introduce the probability properties of random recursive sets systematically in this paper. The main contents include convergence, zero\|one law and support of distribution and self\|similarity.Hutchinson constructed a class of strictly self\|similar sets and got many important results on fractal properties.Graf investigated the fractal properties of a special statistically self\|similar set. We have investigated various self\|similar sets and their probability properties and fractal properties.\;
文摘Immune-based intrusion detection approaches are studied. The methods ofconstructing self set and generating mature detectors are researched and improved. A binary encodingbased self set construction method is applied. First, the traditional mature detector generatingalgorithm is improved to generate mature detectors and detect intrusions faster. Then, a novelmature detector generating algorithm is proposed based on the negative selection mechanism.According to the algorithm, less mature detectors are needed to detect the abnormal activities inthe network. Therefore, the speed of generating mature detecotrs and intrusion detection isimproved. By comparing with those based on existing algorithms, the intrusion detection system basedon the algorithm has higher speed and accuracy.
基金Supported by National Natural Science Foundations of China (Grant Nos. 10971236, 11261039)
文摘In this paper, an equivalent condition for the self similar sets on the real line to have best coverings is given. As a result, it partly gives answer to the conjecture which was posed by Zhou and Feng [Zhou, Z. L., Feng, L.: Twelve open problems on the exact value of the Hausdorff measure and on topological entropy: A brief survey of recent results. Nonlinearity, 17(2), 493-502 (2004)].