Paper Title:
Negative Selection Algorithm Based on Double Matching Rules
  Abstract

The theory of artificial immune had been widely used in the research of network intrusion detection. Nowadays, the existing detector generating algorithms based on negative selection usually use a certain matching rule, as a result, too many detectors may generate, and the false alarm rate will become more serious. This paper proposes an improved negative selection algorithm using double matching rule: candidate detectors should be selected by the improved Hamming distance matching first, then the remaining detectors go through the segmented r-chunks(rch) matching rule. Experiments show that compared with traditional algorithms, this method brings a small number and more efficient detectors, reduces the false alarm rate and guarantees the efficiency of detectors.

  Info
Periodical
Advanced Materials Research (Volumes 204-210)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
42-45
DOI
10.4028/www.scientific.net/AMR.204-210.42
Citation
Y. Hu, B. Li, "Negative Selection Algorithm Based on Double Matching Rules", Advanced Materials Research, Vols. 204-210, pp. 42-45, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Wen Chen, Tao Li, Xiao Jie Liu, Yuan Quan Shi
Abstract:In this article, we proposed a negative selection algorithm which based on hierarchical level cluster of self dataset CB-RNSA. First the self...
486
Authors: Tao Yang, Hong Li Deng, Wen Chen, Zhe Wang
Abstract:The efficiency of traditional negative selection algorithm is too low to be applied. In our algorithm before the detector creation process,...
3200
Authors: Xin Xiao, Rui Rui Zhang
Chapter 7: Storage and Processing of Agricultural Products
Abstract:For the existing artificial immune systems applied to network intrusion detection have some shortages, an improved network intrusion...
687
Authors: Ya Ping Jiang, Jun Wei Zhao, Yue Xia Tian
Chapter 3: Automation, Information Technologies and Data Processing
Abstract:The theory of modern immunology provides a novel idea to study network intrusion detection and defense system. With the concepts of self,...
783