Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Một thuật toán chọn lọc âm tính nhanh dựa trên bộ dò R-chunk
MIỄN PHÍ
Số trang
4
Kích thước
999.1 KB
Định dạng
PDF
Lượt xem
717

Một thuật toán chọn lọc âm tính nhanh dựa trên bộ dò R-chunk

Nội dung xem thử

Mô tả chi tiết

Nguyễn Văn Trƣờng và Đtg Tạp chí KHOA HỌC & CÔNG NGHỆ 90(02): 55 - 58

55

A FAST R-CHUNK DETECTOR-BASED NEGATIVE SELECTION

ALGORITHM

Nguyen Van Truong1*

, Vu Duc Quang1

, Trinh Van Ha2

1College of Education – TNU

2College of Information Technology and Communication- TNU

ABSTRACT

Artificial immune system (AIS) is a diverse and maturing area of research that combines the

disciplines of immunology and computation. Many researches focus on applying immunological

principles to computer security. Negative selection algorithm (NSA) is one of the computational

models of self/nonself discrimination can be designed for anomaly detection. It contains two

stages: generate a set D of detectors that do not match any element of a given self-set S, then using

these detectors to detect if a given cell is self or nonself. The performance of NSA often bases on

the efficiency of generation and detection. Here, we present an r-chunk detector-based NSA that

reduces the overall runtime complexity significantly.

Keywords: Artificial immune system, negative selection algorithm, computer security, R-chunk

detector.

INTRODUCTION*

AIS is inspired by the observation of the

behaviors and the interaction of normal

component of biological systems - the self -

and abnormal ones - the nonself. Real

immune system generates T cells randomly

with the ability to detect harmful antigens.

The receptors of new born T cells are

assembled from combined gene fragments. In

an organ called the thymus, the T cells are

then exposed to proteins from self, and cells

whose receptors match such a self protein are

bound to die. Only those that survive negative

selection may leave the thymus, and use their

receptors to screen the organism for nonself

proteins. This process is known as negative

selection and is applicable of computer

security. An algorithmic abstraction of this

biological process is called a NSA.

The outline of a typical NSA contains two

stages [1]. In the generation stage (Fig. 1), the

detectors are generated by some random

processes and censored by trying to match

given self samples taken from set S. Those

candidates that match are eliminated and the

rest are kept as detectors in set D. In the

detection stage (Fig. 2), the collection of

*

Tel: 0915016063; Email: [email protected]

detectors (or detector set) is used to verify

whether an incoming data instance is self or

nonself. If it matches any detector, it is

claimed as nonself or an anomaly. This

description is limited to some extent, but

conveys the essential idea.

Figure 1. Model of detector generation

No

No

Yes

Begin

Generate random

candidates

Match self

samples?

Accept as new detector

End

Enough detectors?

Yes

Số hóa bởi Trung tâm Học liệu – Đại học Thái Nguyên http://www.lrc-tnu.edu.vn

Tải ngay đi em, còn do dự, trời tối mất!