{"title":"Detector optimization algorithm with co-evolution in immunity-based intrusion detection system","authors":"Xi Liang, Zhang Fengbin","doi":"10.1109/MIC.2013.6758040","DOIUrl":null,"url":null,"abstract":"In the immunity-based intrusion detection system, the detector is the most important component. But, it has some problems should be solved before detection, and the detector optimization of security holes is a research hotspot. In this paper, analyzing the relationship with number of detector and detection performances, inspired by the species' co-evolution in nature, a detector optimization algorithm with co-evolution is proposed. The experimental tests demonstrate that the algorithm can not only decrease the security holes but also achieve a more precise coverage of the nonself space with fewer detectors.","PeriodicalId":404630,"journal":{"name":"Proceedings of 2013 2nd International Conference on Measurement, Information and Control","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2013 2nd International Conference on Measurement, Information and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MIC.2013.6758040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In the immunity-based intrusion detection system, the detector is the most important component. But, it has some problems should be solved before detection, and the detector optimization of security holes is a research hotspot. In this paper, analyzing the relationship with number of detector and detection performances, inspired by the species' co-evolution in nature, a detector optimization algorithm with co-evolution is proposed. The experimental tests demonstrate that the algorithm can not only decrease the security holes but also achieve a more precise coverage of the nonself space with fewer detectors.