{"title":"Ant Algorithm Inspired Immune Intrusion Detector Generation Algorithm","authors":"Xiaowei Wang, Li-na Sun","doi":"10.1109/NCIS.2011.124","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a novel generative method for immune intrusion detectors inspired by principle of ant algorithm. In detector generation stage, we use the characteristics of distributed processing of ant algorithm, which can quickly generate high quality detectors. In the stage of labeling the detectors, the label of the detectors is decided according to prior knowledge. The algorithm is simple, which do not need to undertake initial categories of division. Simulation experiments show that this algorithm performs as well as the state-of-the-art detector algorithms when recognizing known attacks, but is significantly more effective on identifying unknown attacks.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper, we propose a novel generative method for immune intrusion detectors inspired by principle of ant algorithm. In detector generation stage, we use the characteristics of distributed processing of ant algorithm, which can quickly generate high quality detectors. In the stage of labeling the detectors, the label of the detectors is decided according to prior knowledge. The algorithm is simple, which do not need to undertake initial categories of division. Simulation experiments show that this algorithm performs as well as the state-of-the-art detector algorithms when recognizing known attacks, but is significantly more effective on identifying unknown attacks.