{"title":"比较二进制编码检测器和基于约束的检测器的性能","authors":"Haiyu Hou, G. Dozier","doi":"10.1109/CEC.2004.1330937","DOIUrl":null,"url":null,"abstract":"Artificial immune systems can be used to detect intrusion by classifying network activities as normal or abnormal. High detection rates and low false positive rates are two necessary features of successful AIS. Strong detectors are the basis of creating a successful AIS. Some preliminary experiments showed its promise to encode detectors in the form of data triples. Currently, there are two types of detectors: binary-coded and constraint-based. This paper compares the two types of detectors using simulated network traffic data. The results show that constraint-based detectors perform better than binary-coded detectors.","PeriodicalId":152088,"journal":{"name":"Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Comparing performance of binary-coded detectors and constraint-based detectors\",\"authors\":\"Haiyu Hou, G. Dozier\",\"doi\":\"10.1109/CEC.2004.1330937\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Artificial immune systems can be used to detect intrusion by classifying network activities as normal or abnormal. High detection rates and low false positive rates are two necessary features of successful AIS. Strong detectors are the basis of creating a successful AIS. Some preliminary experiments showed its promise to encode detectors in the form of data triples. Currently, there are two types of detectors: binary-coded and constraint-based. This paper compares the two types of detectors using simulated network traffic data. The results show that constraint-based detectors perform better than binary-coded detectors.\",\"PeriodicalId\":152088,\"journal\":{\"name\":\"Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CEC.2004.1330937\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEC.2004.1330937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparing performance of binary-coded detectors and constraint-based detectors
Artificial immune systems can be used to detect intrusion by classifying network activities as normal or abnormal. High detection rates and low false positive rates are two necessary features of successful AIS. Strong detectors are the basis of creating a successful AIS. Some preliminary experiments showed its promise to encode detectors in the form of data triples. Currently, there are two types of detectors: binary-coded and constraint-based. This paper compares the two types of detectors using simulated network traffic data. The results show that constraint-based detectors perform better than binary-coded detectors.