TAILIEUCHUNG - A new approach for generating a complete detector repertoire in artificial immune systems

We present a novel data structure for extracting data from protected self set. That helps to produce all possible detectors, or a complete detector repertoire, with lower time and space complexities compare to recent novel approaches. Theoretical analysis and experimental results show that our approach is effective and feasible. These new valuable characteristics can make complex AIS have the highest ability to detect data changes and to reduce false detection. | Nguyễn Văn Trường và đtg Tạp chí KHOA HỌC & CÔNG NGHỆ 80(04): 121 - 125 A NEW APPROACH FOR GENERATING A COMPLETE DETECTOR REPERTOIRE IN ARTIFICIAL IMMUNE SYSTEMS Nguyen Van Truong1, Pham Dinh Lam2 1 College of Education – TNU; 2 Board of Information Technology - TNU ABSTRACT Generation of the Detector set is a key problem in Artificial Immune Systems (AIS) due to cost of time and space. A weakness in many detector generating algorithms was random generation of detectors so that many candidate detectors may be discarded. We present a novel data structure for extracting data from protected self set. That helps to produce all possible detectors, or a complete detector repertoire, with lower time and space complexities compare to recent novel approaches. Theoretical analysis and experimental results show that our approach is effective and feasible. These new valuable characteristics can make complex AIS have the highest ability to detect data changes and to reduce false detection. Keywords: Artificial immune system, Intrusion detection system, self set, detector set, complete detector repertoire, false detection INTRODUCTION* It is impractical for security software to detect all intrusions in computer networks. Many network technologies on security came into being. The more successful one is based on AIS, which illustrates biology immune system on computers. It is evaluated as a new and effective soft computing method in the field of network security and information security. Especially, it is suitable for building up the Intrusion Detection Systems (IDS) that can protect computer systems against intruders and the destruction of computer viruses or other malicious software system. This paper is concerned with one aspect of computer security: ability of detecting all kinds of changes or attacks, both known and unknown ones. The method explored involves the most discussed immune models: Negative selection algorithm. In the algorithm, generating the detector set .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.