Research on Principal Components Weighted Based on Real-valued Negative Selection Algorithm

被引:0
|
作者
Zhang, Fengbin [1 ]
Yue, Xin [1 ,2 ]
Wang, Dawei [1 ]
Xi, Liang [1 ]
机构
[1] Harbin Univ Sci & Technol, Comp Sci & Technol Coll, Harbin, Peoples R China
[2] Heilongjiang Inst Sci & Technol, Comp & Informat Engn Coll, Harbin, Peoples R China
基金
中国国家自然科学基金;
关键词
anomaly detection; principal component analysis; weighted Euclidean distance;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to improve the identification and distribution performance of the detector, this paper proposes Principal Component Weighted Real-valued Negative Selection Algorithm(PCW-RNS) which is based on principal component weighting. The similarity between this algorithm and the classical real-valued detector generating algorithm based on generation-and-elimination lies in the fact that neither adopt any optimization method to optimize the performance of the detector, but only relying on the detection performance of the detector to detect anomalies. Because of the irrelevance between the principal components and the application of weighted Euclidean distance as the matching rules, the detector can adjust its radius according to the distribution of non-self space, thus obtaining higher detection rate of the detector and improving distribution performance of the detector. In this way, we can not only better the identification performance of the detector and obtain a higher detection rate, but also effectively reduce the false alarm rate.
引用
收藏
页码:396 / 399
页数:4
相关论文
共 50 条
  • [21] Applicability issues of the real-valued negative selection algorithms
    Ji, Zhou
    Dasgupta, Dipankar
    [J]. GECCO 2006: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2006, : 111 - +
  • [22] Anomaly detection using real-valued negative selection
    Zhang, FB
    Yang, YT
    Wang, SW
    [J]. ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 949 - 952
  • [23] Intrusion Detection systems using Real-Valued Negative Selection Algorithm with Optimized Detectors
    Selahshoor, Fatemeh
    Jazayeriy, Hamid
    Omranpour, Hesam
    [J]. 2019 5TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS 2019), 2019,
  • [24] Exogenous parameter selection in a real-valued genetic algorithm
    Kaiser, CE
    Lamont, GB
    Merkle, LD
    Gates, GH
    Pachter, R
    [J]. PROCEEDINGS OF 1997 IEEE INTERNATIONAL CONFERENCE ON EVOLUTIONARY COMPUTATION (ICEC '97), 1997, : 569 - 574
  • [25] Orchestrating Real-Valued Negative Selection Algorithm with Computational Efficiency for Crude Oil Price
    Lasisi, Ayodele
    Ghazali, Rozaida
    Herawan, Tutut
    Chiroma, Haruna
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, ICIC 2015, PT III, 2015, 9227 : 387 - 396
  • [26] EvoSeedRNSAII: An improved evolutionary algorithm for generating detectors in the real-valued Negative Selection Algorithms
    Zhang, Jie
    Luo, Wenjian
    [J]. APPLIED SOFT COMPUTING, 2014, 19 : 18 - 30
  • [27] Intrusion Detection Techniques Based on cutting-based real-valued negative selection
    Lei, Yang
    Wang, Xu'an
    Yin, Hongyan
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 498 - 503
  • [28] Technique for Intrusion Detection based on Cutting-based Real-valued Negative Selection
    Ling, Niu
    Feng, Feng Gao
    Jing, Ma
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 95 - 104
  • [29] Improved real-valued clonal selection algorithm based on a novel mutation method
    Gong, Maoguo
    Jiao, Licheng
    Zhang, Lining
    Ma, Wenping
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 678 - 681
  • [30] Real-valued Dual Negative Selection Technique for Intrusion Detection
    Ling, Niu
    Feng, Feng Gao
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 279 - 288