Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
An Anomaly Detection Algorithm Based on Artificial Immune Intelligence
LIU Li-ping
Jiangsu College of Safety technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Network anomaly detection model can be used to detect unknown attacks, which has good scalability and it is the hot spot of intrusion detection system research. However, the existing anomaly detection methods have some problems such as high false positive rate and low detection efficiency, which can not meet the needs of high-speed network real-time detection. Combining artificial immune algorithm with network anomaly technology, an anomaly network detection algorithm based on artificial immune network (AIAIK) is proposed. Theoretical analysis and experimental results show that the algorithm has good characteristics such as immune network, nonlinear, immune memory and clonal selection of natural immune system, and the experimental detection effect is good.
Key wordsanomaly detection      artificial immune      machine learning     
ZTFLH:  TP309  

Cite this article:

LIU Li-ping. An Anomaly Detection Algorithm Based on Artificial Immune Intelligence. Computer & Telecommunication, 2017, 1(12): 67-70.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2017/V1/I12/67

[1] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[2] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[3] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[4] TONG Lian. Research and Application of Machine Learning in Big Data[J]. 电脑与电信, 2018, 1(9): 29-31.
[5] SONG Tian-shu, LI Jiang-yu, ZHANG Qin-zhe. Research on Personal Microblog Clustering Based on CBOW Model[J]. 电脑与电信, 2018, 1(4): 69-72.
[6] Wang Wang. Coverage Simulation of Base Stations Based on Machine Learning[J]. 电脑与电信, 2018, 1(11): 45-47.
[7] Yin Mengjia . An Artificial Immune Model Based on Danger Theory [J]. , 2012, 1(3): 0-0.
[8] Deng xiao-wu Li sen-lin Hu Ping. Theoretical Research and Analysis in Artificial Immune Systems[J]. , 2011, 1(08): 0-0.
[9] Xu Lulei. Comparison of The two Methods of Sentiment Terms Identification on the Web[J]. , 2011, 1(01): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd