Optimization of Real-Valued Self Set for Anomaly Detection Using Gaussian Distribution

被引:0
|
作者
Xi, Liang [1 ]
Zhang, Fengbin [1 ]
Wang, Dawei [1 ]
机构
[1] Harbin Univ Sci & Technol, Coll Comp Sci & Technol, Harbin 150080, Peoples R China
关键词
anomaly detection; artificial immunity system; real-valued self set; Gaussian distribution;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The real-valued negative selection algorithm (RNS) has been a key algorithm of anomaly detection. However, the self set which is used to train detectors has some problems, such as the wrong samples; boundary invasion and the overlapping among the self samples. Due to the fact that the probability of most real-valued self vectors is near to Gaussian distribution, this paper proposes a new method which uses Gaussian distribution theory to optimize the self set before training stage. The method was tested by 2-dimensional synthetic data and real network data. Experimental results show that, the new method effectively solves the problems mentioned before.
引用
收藏
页码:112 / 120
页数:9
相关论文
共 50 条
  • [41] A self region based real-valued negative selection algorithm
    张凤斌
    王大伟
    王胜文
    [J]. Journal of Harbin Institute of Technology(New series), 2008, (06) : 851 - 855
  • [42] Layered and Real-Valued Negative Selection Algorithm for Fault Detection
    Abid, Anam
    Khan, Muhammad Tahir
    de Silva, Clarence W.
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (03): : 2960 - 2969
  • [43] Intrusion Detection systems using Real-Valued Negative Selection Algorithm with Optimized Detectors
    Selahshoor, Fatemeh
    Jazayeriy, Hamid
    Omranpour, Hesam
    [J]. 2019 5TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS 2019), 2019,
  • [44] Nonlinear mapping using real-valued genetic algorithm
    Chen, ZP
    Jiang, JH
    Li, Y
    Yu, RQ
    [J]. CHEMOMETRICS AND INTELLIGENT LABORATORY SYSTEMS, 1999, 45 (1-2) : 409 - 418
  • [45] REAL-VALUED ERROR CONTROL CODING BY USING DCT
    WU, JL
    SHIU, J
    [J]. IEE PROCEEDINGS-I COMMUNICATIONS SPEECH AND VISION, 1992, 139 (02): : 133 - 139
  • [46] Real-valued Dual Negative Selection Technique for Intrusion Detection
    Ling, Niu
    Feng, Feng Gao
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 279 - 288
  • [47] Real-valued LCS using UNDX for technology extraction
    Kurahashi, Setsuya
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2008, 5178 : 1026 - 1033
  • [49] An optimization algorithm for recursive weighted median filters with real-valued weights
    Paredes, JL
    Arce, GR
    [J]. 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL I, PROCEEDINGS, 2000, : 892 - 895
  • [50] Optimization of Imprecise Circuits Represented by Taylor Series and Real-Valued Polynomials
    Pang, Yu
    Radecka, Kartazyna
    Zilic, Zeljko
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2010, 29 (08) : 1177 - 1190