Paper Title:
The Research of Immunity Intrusion Detector Model Based on Vaccine Independent Mechanism
  Abstract

This paper describes a model of immune intrusion detection in which an independent form is introduced in. Immune intrusion detection receives the vaccine signal to control the Vaccine Module in real-time signal processing. Vaccine extraction signal is that extract from one memory detector set with antibodies to mature vaccine set and vaccination signal is that vaccinated other mature detectors which need vaccination. The objective of this model is to share antibodies (detectors), establish communication links between different detectors increase the flexibility of detectors and improve the overall detection ability of detectors. Through the simulation by MATLBE, it proves this model has greater comprehensive detection performance.

  Info
Periodical
Advanced Materials Research (Volumes 204-210)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
636-639
DOI
10.4028/www.scientific.net/AMR.204-210.636
Citation
Y. Hu, L. Zheng, "The Research of Immunity Intrusion Detector Model Based on Vaccine Independent Mechanism", Advanced Materials Research, Vols. 204-210, pp. 636-639, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Rong Deng, Xiu Yin Zhang
Abstract:In this article an Immune Based Intrusion Detection Model (IBIDM) was built to simulate the dynamic relationships between the intrusion...
482
Authors: Tao Yang, Hong Li Deng, Wen Chen, Zhe Wang
Abstract:The efficiency of traditional negative selection algorithm is too low to be applied. In our algorithm before the detector creation process,...
3200
Authors: Yu Ling Tian, Yu Hao Liu
Abstract:As in the dynamic clone selection algorithm, the detector use factor is low, the overall importance is bad, this article proposed that the...
552
Authors: Rong Hua Hu, Pei Huang Lou, Peng Zhao
Chapter 7: Computer Application in Design and Manufacturing (1)
Abstract:The detector sets generated by Real-Valued Negative Selection Algorithm (RNSA) are usually numerous, without optimization, and can not work...
3736
Authors: Cai Ming Liu, Yan Zhang, Run Chen, Lu Xin Xiao, Jian Dong Zhang
Chapter 16: Auto-Detection Technology
Abstract:The fast development of the Internet of Things (IoT) makes its security problems appear gradually. It is urgent to study the intrusion...
1982