Immune algorithms based on data processing in intrusion detection

被引:0
|
作者
Zhang, Yufang [1 ]
Xiong, Zhongyang [2 ]
Chen, Yan [3 ]
Li, Guangyong [1 ]
Geng, Xiaofei [1 ]
机构
[1] College of Computer Science, Chongqing University, Chongqing 400044, China
[2] Post-Doctorial Research Station of Electrical Engineering, Chongqing University, Chongqing 400044, China
[3] Chongqing College of Technology, Chongqing 400050, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
8
引用
收藏
页码:293 / 300
相关论文
共 50 条
  • [1] Intrusion detection based on immune clonal selection algorithms
    Fang, L
    Bo, Q
    Chen, RS
    [J]. AI 2004: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3339 : 1226 - 1232
  • [2] Survey of Intrusion Detection Methods Based on Data Mining Algorithms
    Jin, Zichuan
    Cui, Yanpeng
    Yan, Zheng
    [J]. BDE 2019: 2019 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING, 2019, : 92 - 100
  • [3] Intelligent Processing of Intrusion Detection Data
    Duan, Tao
    Tian, Youhui
    Zhang, Hanrui
    Liu, Yaozong
    Li, Qianmu
    Jiang, Jian
    Shi, Zongsheng
    [J]. IEEE ACCESS, 2020, 8 : 78330 - 78342
  • [4] Artificial immune theory based network intrusion detection system and the algorithms design
    Yang, XR
    Shen, JY
    Wang, R
    [J]. 2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 73 - 77
  • [5] Evaluating Artificial Immune System Algorithms for Intrusion Detection
    Pump, Richard
    Ahlers, Volker
    Koschel, Arne
    [J]. PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 92 - 97
  • [6] Application of PSVM and data processing for intrusion detection
    Xiao, Haijun
    Hong, Fan
    Zhang, Zhaoli
    Liao, Junguo
    [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 627 - 633
  • [7] A REVIEW OF HUMAN IMMUNE INSPIRED ALGORITHMS FOR INTRUSION DETECTION SYSTEMS
    Duru, Chukwuemeka
    Ladeji-Osias, Jumoke
    Wandji, Ketchiozo
    Otily, Toutsop
    Kone, Rachida
    [J]. 2022 IEEE WORLD AI IOT CONGRESS (AIIOT), 2022, : 364 - 371
  • [8] A model of evolving intrusion detection system based on data mining and immune principle
    Zhao, JZ
    Xu, MZ
    Sun, SL
    You, L
    [J]. TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B199 - B202
  • [9] Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method
    Liu, Cai Ming
    Zhang, Yan
    Hu, Zhihui
    Xie, Chunming
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (02): : 2361 - 2389
  • [10] An intrusion detection systembased on data mining and immune principles
    Zhao, JZ
    Huang, HK
    [J]. 2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 524 - 528