Application of Negative Selection Theory in Intrusion Detection
Authors
Yunhui Xing, Zhaowen Lin, Yan Ma
Corresponding Author
Yunhui Xing
Available Online December 2015.
- DOI
- 10.2991/icmmcce-15.2015.533How to use a DOI?
- Keywords
- network security, artificial immune systems (AIS), negative selection algorithm(NSA), instruction detection.
- Abstract
Along with the rapid development of Internet, network security has become one of high-profile issues in the current life. In this paper, the problem of instruction detection based on artificial immune system model and the key technologies negative selection algorithm(NSA) are discussed in detail, by the reviews of the recent history and present state. Simulation experiments reveals their characteristics of three matching algorithms including r-contiguous-bits, r-adjustable-bits and hamming distance algorithm.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yunhui Xing AU - Zhaowen Lin AU - Yan Ma PY - 2015/12 DA - 2015/12 TI - Application of Negative Selection Theory in Intrusion Detection BT - Proceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015 PB - Atlantis Press SN - 2352-538X UR - https://doi.org/10.2991/icmmcce-15.2015.533 DO - 10.2991/icmmcce-15.2015.533 ID - Xing2015/12 ER -