WANG Tianbo, ZHANG Fengbin, XIA Chunhe. Research on Loophole with Second Distribution of Real Value Detectors[J]. Chinese Journal of Electronics, 2016, 25(6): 1141-1150. doi: 10.1049/cje.2016.08.004
Citation: WANG Tianbo, ZHANG Fengbin, XIA Chunhe. Research on Loophole with Second Distribution of Real Value Detectors[J]. Chinese Journal of Electronics, 2016, 25(6): 1141-1150. doi: 10.1049/cje.2016.08.004

Research on Loophole with Second Distribution of Real Value Detectors

doi: 10.1049/cje.2016.08.004
Funds:  This work is supported by the National Natural Science Foundation of China (No.61172168, No.61170295), the Project of National Ministries Foundation of China (No.A2120110006), the Co-Funding Project of Beijing Municipal Education Commission (No.JD100060630), and the Research Project of Aviation Industry of China (No.CXY2011BH07).
  • Received Date: 2014-10-10
  • Rev Recd Date: 2014-12-01
  • Publish Date: 2016-11-10
  • Traditional anomaly detection algorithm has improved to some degree the mechanism of negative selection. There still remain many problems such as the randomness of detector generation, incompleteness of self-set and the generalization ability of detectors, which would cause a lot of loopholes in non-self space. A heuristic algorithm based on the second distribution of real value detectors for the remains of loopholes of the non-self space in the first distribution and the mutation regions of self space is proposed. The algorithm can distribute real value detectors through omission data based on the methods of partition and movement. A method is proposed to solve the problem on how to get the optimal solutions to the parameters related in the algorithm. Theoretical analysis and experimental results prove the universality and effectiveness of the method. It is found that our algorithm can effectively avoid the generation of loopholes and thus reduce the omission rate of detector sets.
  • loading
  • E. Hart and J. Timmis, "Application areas of AIS: The past, the present and the future", Applied Soft Computing, Vol.8, pp.191-201, 2008.
    D.F. Yap, S. Koh, S. Tiong and S. Prajindra, "A hybrid artificial immune systems for multimodal function optimization and its application in engineering problem", Artificial Intelligence Review, Vol.38, pp.291-301, 2012.
    S. Forrest, A.S. Perelson, L. Allen and R. Cherukuri, "Selfnonself discrimination in a computer", Proc. of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, USA, pp.202-212, 1994.
    Z. Ji and D. Dasgupta, "V-detector: An efficient negative selection algorithm with ‘probably adequate’ detector coverage", Information sciences, Vol.179, pp.1390-1406, 2009.
    M. Majd, F. Shoeleh, A. Hamzeh and S. Hashemi, Simulated Evolution and Learning, Springer, Berlin, Germany, pp.45-54, 2010.
    J. Textor, Parallel Problem Solving from Nature-PPSN XII, Springer, Berlin, Germany, pp.32-41, 2012.
    A.S.A. Aziz, M. Salama and S. EL-Ola Hanafi, "Detectors generation using genetic algorithm for a negative selection inspired anomaly network intrusion detection system," Proc. of Federated Conference on Computer Science and Information Systems (FedCSIS), Wroclaw, Poland, pp.597-602, 2012.
    F. Liu, M. Gong, J. Ma, L. Jiao and W. Zhang, "Optimizing detector distribution in V-detector negative selection using a constrained multiobjective immune algorithm", Proc. of 2010 IEEE Congress on Evolutionary Computation (CEC), Barcelona, Spain, pp.1-8, 2010.
    M. Gong, J. Zhang, J. Ma and L. Jiao, "Short communication: An efficient negative selection algorithm with further training for anomaly detection", Knowledge-Based Systems, Vol.30, pp.185-191, 2012.
    L. Xi, "Research on dynamic adaptive mechanism of self and detector in immunity-based intrusion detection system", Ph.D. Thesis, Harbin University of Science and Technology, 2012. (in Chinese)
    H. Du, M. Gong, R. Liu and L. Jiao, "Adaptive chaos clonal evolutionary programming algorithm", Science in China Series E: Information Sciences, Vol.35, pp.817-829, 2005.
    R. Zhang, T. Li, and X. Xiao, "A Real-Valued Negative Selection Algorithm Based on Grid for Anomaly Detection", Abstract and Applied Analysis, 2013, pp.1-15.
    A. Asuncion and D. Newman, "UCI Datasets", http://archive.ics.uci.edu/ml/datasets.html,2007.
    A. Asuncion and D. Newman, "KDD CUP99 Dataset", http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html,2007.
    F.A. González and D. Dasgupta, "Anomaly Detection Using Real-Valued Negative Selection", Genetic Programming and Evolvable Machines, Vol.4, pp.383-403, 2003.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (165) PDF downloads(414) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return