tailieunhanh - Afast R-chunk detector-based negative selection algorithm
It contains two stages: generate a set D of detectors that do not match any element of a given self-set S, then using these detectors to detect if a given cell is self or nonself. The performance of NSA often bases on the efficiency of generation and detection. Here, we present an r-chunk detector-based NSA that reduces the overall runtime complexity significantly. | Nguyễn Văn Trƣờng và Đtg Tạp chí KHOA HỌC & CÔNG NGHỆ 90(02): 55 - 58 A FAST R-CHUNK DETECTOR-BASED NEGATIVE SELECTION ALGORITHM Nguyen Van Truong1*, Vu Duc Quang1, Trinh Van Ha2 1 College of Education – TNU College of Information Technology and Communication- TNU 2 ABSTRACT Artificial immune system (AIS) is a diverse and maturing area of research that combines the disciplines of immunology and computation. Many researches focus on applying immunological principles to computer security. Negative selection algorithm (NSA) is one of the computational models of self/nonself discrimination can be designed for anomaly detection. It contains two stages: generate a set D of detectors that do not match any element of a given self-set S, then using these detectors to detect if a given cell is self or nonself. The performance of NSA often bases on the efficiency of generation and detection. Here, we present an r-chunk detector-based NSA that reduces the overall runtime complexity significantly. Keywords: Artificial immune system, negative selection algorithm, computer security, R-chunk detector. INTRODUCTION* AIS is inspired by the observation of the behaviors and the interaction of normal component of biological systems - the self and abnormal ones - the nonself. Real immune system generates T cells randomly with the ability to detect harmful antigens. The receptors of new born T cells are assembled from combined gene fragments. In an organ called the thymus, the T cells are then exposed to proteins from self, and cells whose receptors match such a self protein are bound to die. Only those that survive negative selection may leave the thymus, and use their receptors to screen the organism for nonself proteins. This process is known as negative selection and is applicable of computer security. An algorithmic abstraction of this biological process is called a NSA. The outline of a typical NSA contains two stages [1]. In the generation stage (Fig. 1), the detectors are
đang nạp các trang xem trước