{"title":"基于蚁群算法的免疫入侵检测器生成算法","authors":"Xiaowei Wang, Li-na Sun","doi":"10.1109/NCIS.2011.124","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a novel generative method for immune intrusion detectors inspired by principle of ant algorithm. In detector generation stage, we use the characteristics of distributed processing of ant algorithm, which can quickly generate high quality detectors. In the stage of labeling the detectors, the label of the detectors is decided according to prior knowledge. The algorithm is simple, which do not need to undertake initial categories of division. Simulation experiments show that this algorithm performs as well as the state-of-the-art detector algorithms when recognizing known attacks, but is significantly more effective on identifying unknown attacks.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Ant Algorithm Inspired Immune Intrusion Detector Generation Algorithm\",\"authors\":\"Xiaowei Wang, Li-na Sun\",\"doi\":\"10.1109/NCIS.2011.124\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a novel generative method for immune intrusion detectors inspired by principle of ant algorithm. In detector generation stage, we use the characteristics of distributed processing of ant algorithm, which can quickly generate high quality detectors. In the stage of labeling the detectors, the label of the detectors is decided according to prior knowledge. The algorithm is simple, which do not need to undertake initial categories of division. Simulation experiments show that this algorithm performs as well as the state-of-the-art detector algorithms when recognizing known attacks, but is significantly more effective on identifying unknown attacks.\",\"PeriodicalId\":215517,\"journal\":{\"name\":\"2011 International Conference on Network Computing and Information Security\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Network Computing and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIS.2011.124\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ant Algorithm Inspired Immune Intrusion Detector Generation Algorithm
In this paper, we propose a novel generative method for immune intrusion detectors inspired by principle of ant algorithm. In detector generation stage, we use the characteristics of distributed processing of ant algorithm, which can quickly generate high quality detectors. In the stage of labeling the detectors, the label of the detectors is decided according to prior knowledge. The algorithm is simple, which do not need to undertake initial categories of division. Simulation experiments show that this algorithm performs as well as the state-of-the-art detector algorithms when recognizing known attacks, but is significantly more effective on identifying unknown attacks.