Proceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015

Application of Negative Selection Theory in Intrusion Detection

Authors
Yunhui Xing, Zhaowen Lin, Yan Ma
Corresponding Author
Yunhui Xing
Available Online December 2015.
DOI
https://doi.org/10.2991/icmmcce-15.2015.533How to use a DOI?
Keywords
network security, artificial immune systems (AIS), negative selection algorithm(NSA), instruction detection.
Abstract

Along with the rapid development of Internet, network security has become one of high-profile issues in the current life. In this paper, the problem of instruction detection based on artificial immune system model and the key technologies negative selection algorithm(NSA) are discussed in detail, by the reviews of the recent history and present state. Simulation experiments reveals their characteristics of three matching algorithms including r-contiguous-bits, r-adjustable-bits and hamming distance algorithm.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015
Series
Advances in Computer Science Research
Publication Date
December 2015
ISBN
978-94-6252-133-9
ISSN
2352-538X
DOI
https://doi.org/10.2991/icmmcce-15.2015.533How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Yunhui Xing
AU  - Zhaowen Lin
AU  - Yan Ma
PY  - 2015/12
DA  - 2015/12
TI  - Application of Negative Selection Theory in Intrusion Detection
BT  - Proceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015
PB  - Atlantis Press
SN  - 2352-538X
UR  - https://doi.org/10.2991/icmmcce-15.2015.533
DO  - https://doi.org/10.2991/icmmcce-15.2015.533
ID  - Xing2015/12
ER  -