Intrusion detection method based on tripling real value negative selection

A technology of negative selection and intrusion detection, which is applied in the field of network information security, can solve the problems of repeated coverage of detectors, low detection efficiency, excessive elements, etc., and achieve the advantages of detection efficiency, black hole number reduction, and good robustness Effect

Inactive Publication Date: 2015-07-01
XIAN UNIV OF POSTS & TELECOMM
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of algorithm is likely to lead to excessive elements in the mature detector set and excessive duplication of coverage between detectors, thereby reducing the detection efficiency; (2) The newly emerged improved negative selection algorithm one-sidedly emphasizes The absolute dissimilarity of the elements in the detector set, but the optimization problem of the mature detector set elements with a certain coverage among each other is rarely involved.
Therefore, to a certain extent, this type of algorithm still has the problems of too many black holes in the detection results, too large a set of mature detectors, and low detection efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method based on tripling real value negative selection
  • Intrusion detection method based on tripling real value negative selection
  • Intrusion detection method based on tripling real value negative selection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] Taking the 25 instances of Setosa in the Iris dataset as the self-training set as an example, image 3 It is a method flow chart of an embodiment of the present invention, and the steps specifically include:

[0042] (1) Candidate detectors are matched with individuals in the mature detector set, Figure 4 A flow chart of matching a candidate detector with a mature detector according to an embodiment of the present invention:

[0043] (11) Randomly generate a candidate detector Xi;

[0044] (12) Calculate the distance dis(dXi,dn) between the Xi center and each detector in the mature detec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection method based on the tripling real value negative selection and belongs to the field of network information security. The method includes simulating the immune mechanism of an organism, and adopting own normal behavior data as an tautological set; firstly, matching alternate detectors and individuals of a mature detector set, if the matching fails, determining the alternate detectors as shortlisted ones; secondly, detecting the alternate detectors through the trained tautological set, and determining the shortlisted detectors disjointed to the trained tautological set to be elements of the mature detector set; finally, integrating and optimizing the elements of the mature detector set. By the aid of the method, the problems that in the current intrusion detecting process, the number of black holes is large, the mature detector set is large in scale and the detecting efficiency is low are solved, the mature detector set scale can be compacted, the detecting capability is improved, the theory development of the intrusion detection can be promoted, and the high application value is provided.

Description

technical field [0001] The invention belongs to the field of network information security, and in particular relates to an intrusion detection method based on triple real-value negative selection. Background technique [0002] The wide application of computer network has brought great convenience to the production and life of human beings. However, the increasingly severe network security situation is always sounding the alarm, which has become a real problem that we cannot ignore. At present, the research on network intrusion detection methods has attracted extensive attention from scholars in related fields at home and abroad, among which the negative selection algorithm for intrusion detection with a profound background in biological immunology has become a research hotspot. [0003] In biological immunology, immune cells in the body can effectively detect and attack foreign bodies. Similarly, access behaviors in computer networks can also be divided into two categories, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 孔韦韦雷阳马婧
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products