Generation of detectors and detecting method

A detector, a mature detector technology, applied in the fields of instruments, biological models, electrical digital data processing, etc., can solve the problems of low detector generation efficiency, difficult binary strings, redundant detectors, etc., to improve the generation efficiency and detection efficiency, improve comparison performance, and eliminate vulnerabilities.

Inactive Publication Date: 2011-11-16
JIANGSU UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] To sum up, since the original antigens and antibodies are expressed in the form of binary strings that are difficult to process, the current detector generation methods all have problems of low detector generation efficiency, loopholes and redundant detectors to varying degrees.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation of detectors and detecting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Further description will be given below in conjunction with the examples.

[0044]Known 32-bit binary self character string (assuming that the string contains all self bodies whose length is l): 00101000100100000100001010010011, divide it into subself character string sets S whose length is l=4,

[0045] S={0010, 0101, 1010, 0100, 1000, 0001, 0010, 0100, 1001, 0010, 0100, 1000, 0000, 0000, 0001, 0010, 0100, 1000, 0000, 0001,

[0046] 0010, 0101, 1010, 0100, 1001, 0010, 0100, 1001, 0011}.

[0047] Replacing the self-substring in the set S with a decimal number, the corresponding sub-self string set can be expressed as:

[0048] S={2, 5, 10, 4, 8, 1, 2, 4, 9, 2, 4, 8, 0, 0, 1, 2, 4, 8, 0, 1, 2, 5, 10, 4 ,9,2,4,9,3}

[0049] (1) Generation of detectors

[0050] Since the substring length l=4, the initial detector interval in binary form ranges from 0000 to 1111, ie [0, 15]. Figure 1 shows the initial detector R that conforms to the number field of the above example 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to generation of detectors and a detecting method. The method comprises the following steps: defining a maximum interval as an initial detector; then carrying out self-tolerance training on the initial detector; according to matching rules, removing a point matching a known self from the detector, simultaneously dividing the interval of the detector from the point to generate two subinterval detectors and recursively detecting each subinterval. The detectors are optimized in the process and the generated mature detectors are finally gathered to be used for system security protection. The invention breaks through the existing detector generation method and matching rules and eliminates loopholes and redundant detectors, thereby further improving the generation efficiency and detection efficiency of the detectors.

Description

technical field [0001] The invention applies various excellent characteristics of the biological immune system to the computer system, and is mainly used to solve practical problems such as computer virus prevention and control, network intrusion detection, etc., belongs to the cross technical field of bioinformatics and computer science, and specifically relates to a detection generation and detection methods. Background technique [0002] The immune system protects the body from external bacteria, viruses, etc., and is able to recognize foreign cells or molecules, and then eliminate these harmful substances from the body, while observing the appearance of abnormal cells in the body, and eliminating cells that have mutated. The primary problem facing immune cells is how to define self / nonself and recognize them. Self / non-self identification is a high-efficiency pattern recognition problem. [0003] At present, the research on the artificial immune system includes two cate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06N3/00G06F21/24G06F21/56
Inventor 鞠时光夏惠芬蔡涛
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products