Abstract
After studying the existing detector generating algorithms used in the intrusion detection systems, we improves the lacks of the algorithms and use them into Trojan detection system, and propose a new approach of detector generating based on chaotic theory. The over-spread character of chaos sequence combined the concept of weighted Euclidean distance was used to generate set of detector with better distribution, and chaos initial value sensitivity was used to enlarge the searching space. The experiment indicates that the algorithm not only remains the diversity of population but also has fast astringency speed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Paul, K., Williams, D., et al.: An Artificial Immune System Architecture for Computer Security Applications. IEEE Transaction on Evolutionary Computation, 6–3 (2002)
Forrest, S., Alan, S., Allen, L.: Self-Nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 202–212 (1994)
Zhang, H.: The Research and Implementation of Unknown Trojan Detection System Based on Artificial Immune. Master thesis of Xian University of electronic science and technology (2009)
Zhang, J.: A Network Intrusion Detection System Model Based on Immune Principle. Lanzhou: The master’s degree thesis of Lanzhou University of technology (2008)
Chen, L., Zhang, L.: The Research on The Application of Artificial Immune Mechanism on Trojan Detection System. University of electronic science and technology journal 34(2), 221–224 (2005)
Yan, X.: Immune Intrusion Detection Model Using Vaccination Strategies. Electronic journal 37(4), 221–224 (2009)
Zhang, N., Li, Z., et al.: The Immune Generating Algorithm Based on Chaotic Theory. Computer application (May 2006)
Wang, H., He, C.: The Public Water-marking Based on Robustness of Chaos Mapping. Journal of software 15(8), 1245–1251 (2004)
Tavazoei, M., Haeri, M.: An Optimization Algorithm Based on Chaotic Behavior and Fractal Nature. J. Compute. Applied Math. 206, 1070–1081 (2007)
Zuo, X.Q., Fan, Y.S.: A Chaos Search Immune Algorithm with Its Application to Neuro-fuzzy Controller Design. Chaos, Solitons and Fractals 30, 94–109 (2006)
Shu, H., You, Z.: Application of Decision Attribute Classification and Mining Algorithm Based on Information Entropy. Computer engineering and application 01, 186–189 (2004)
Hrycej, T.: Identifying Chaotic Attractors with Neural Networks. In: Proceedings of IEEE International Conference on Neural Network, pp. 2664–2668 (1995)
Castro, L., Timmis, J.: Artificial Immune System. A Novel Computational Intelligence Approach. Springer, London (2002)
Li, T.: A Dynamic Intrusion Detection Model Based on Immune. Science bulletin 50, 17 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qin, J., Si, Q., Yan, H., Yan, F. (2011). A Trojan Detector Generating Algorithm Based on Chaotic Theory. In: Huang, DS., Gan, Y., Bevilacqua, V., Figueroa, J.C. (eds) Advanced Intelligent Computing. ICIC 2011. Lecture Notes in Computer Science, vol 6838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24728-6_68
Download citation
DOI: https://doi.org/10.1007/978-3-642-24728-6_68
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24727-9
Online ISBN: 978-3-642-24728-6
eBook Packages: Computer ScienceComputer Science (R0)