Generation of detectors and detecting method

A detector, mature detector technology, applied in the direction of instruments, biological models, electrical digital data processing, etc., can solve the problems of low detector generation efficiency, difficult binary strings, high time complexity and space complexity, and achieve Effects of eliminating "hole" regions and redundant detectors, improving generation efficiency and detection efficiency, and improving comparison performance

Inactive Publication Date: 2009-12-16
JIANGSU UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In 2005, He Shen et al. proposed a detector generation method with a variable detector length l. This method eliminated the "hole" area and improved the detection efficiency of the detector, but there was still the problem of redundant detectors. And the generation of its detector is based on the L-level R-tree for search and matching, th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Further description will be given below in conjunction with the examples.

[0043] Known 32-bit binary self string (assuming the string contains all self bodies of length l):

[0044]00101000100100000100001010010011, divide it into a set S of subself character strings whose length is l=4,

[0045] S={0010,0101,1010,0100,1000,0001,0010,0100,1001,0010,0100,1000,0000,0000,0001,0010,0100,1000,0000,0001,0010,0101,1010,0100 , 1001, 0010, 0100, 1001, 0011}.

[0046] Replacing the self-substring in the set S with a decimal number, the corresponding sub-self string set can be expressed as:

[0047] S={2, 5, 10, 4, 8, 1, 2, 4, 9, 2, 4, 8, 0, 0, 1, 2, 4, 8, 0, 1, 2, 5, 10, 4 ,9,2,4,9,3}

[0048] (1) Generation of detectors

[0049] Since the substring length l=4, the initial detector interval in binary form ranges from 0000 to 1111, ie [0, 15]. The initial detector R conforming to the number field of the above example 1 : [0, 15].

[0050] Following step 2 of the above met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to generation of detectors and a detecting method. The method comprises the following steps: defining a maximum interval as an initial detector; then carrying out self-tolerance training on the initial detector; according to matching rules, removing a point matching a known self from the detector, simultaneously dividing the interval of the detector from the point to generate two subinterval detectors and recursively detecting each subinterval. The detectors are optimized in the process and the generated mature detectors are finally gathered to be used for system security protection. The invention breaks through the existing detector generation method and matching rules and eliminates loopholes and redundant detectors, thereby further improving the generation efficiency and detection efficiency of the detectors.

Description

technical field [0001] The invention applies various excellent characteristics of the biological immune system to the computer system, and is mainly used to solve practical problems such as computer virus prevention and control, network intrusion detection, etc., belongs to the cross technical field of bioinformatics and computer science, and specifically relates to a detection generation and detection methods. Background technique [0002] The immune system protects the body from external bacteria, viruses, etc., and is able to recognize foreign cells or molecules, and then eliminate these harmful substances from the body, while observing the appearance of abnormal cells in the body, and eliminating cells that have mutated. The primary problem facing immune cells is how to define self / nonself and recognize them. Self / non-self identification is a high-efficiency pattern recognition problem. [0003] At present, the research on the artificial immune system includes two cate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06N3/00G06F21/24G06F21/56
Inventor 鞠时光夏惠芬蔡涛
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products