Skip to main content

A Trojan Detector Generating Algorithm Based on Chaotic Theory

  • Conference paper
Advanced Intelligent Computing (ICIC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6838))

Included in the following conference series:

  • 2864 Accesses

Abstract

After studying the existing detector generating algorithms used in the intrusion detection systems, we improves the lacks of the algorithms and use them into Trojan detection system, and propose a new approach of detector generating based on chaotic theory. The over-spread character of chaos sequence combined the concept of weighted Euclidean distance was used to generate set of detector with better distribution, and chaos initial value sensitivity was used to enlarge the searching space. The experiment indicates that the algorithm not only remains the diversity of population but also has fast astringency speed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Paul, K., Williams, D., et al.: An Artificial Immune System Architecture for Computer Security Applications. IEEE Transaction on Evolutionary Computation, 6–3 (2002)

    Google Scholar 

  2. Forrest, S., Alan, S., Allen, L.: Self-Nonself Discrimination in a Computer. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 202–212 (1994)

    Google Scholar 

  3. Zhang, H.: The Research and Implementation of Unknown Trojan Detection System Based on Artificial Immune. Master thesis of Xian University of electronic science and technology (2009)

    Google Scholar 

  4. Zhang, J.: A Network Intrusion Detection System Model Based on Immune Principle. Lanzhou: The master’s degree thesis of Lanzhou University of technology (2008)

    Google Scholar 

  5. Chen, L., Zhang, L.: The Research on The Application of Artificial Immune Mechanism on Trojan Detection System. University of electronic science and technology journal 34(2), 221–224 (2005)

    Google Scholar 

  6. Yan, X.: Immune Intrusion Detection Model Using Vaccination Strategies. Electronic journal 37(4), 221–224 (2009)

    Google Scholar 

  7. Zhang, N., Li, Z., et al.: The Immune Generating Algorithm Based on Chaotic Theory. Computer application (May 2006)

    Google Scholar 

  8. Wang, H., He, C.: The Public Water-marking Based on Robustness of Chaos Mapping. Journal of software 15(8), 1245–1251 (2004)

    Google Scholar 

  9. Tavazoei, M., Haeri, M.: An Optimization Algorithm Based on Chaotic Behavior and Fractal Nature. J. Compute. Applied Math. 206, 1070–1081 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  10. Zuo, X.Q., Fan, Y.S.: A Chaos Search Immune Algorithm with Its Application to Neuro-fuzzy Controller Design. Chaos, Solitons and Fractals 30, 94–109 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  11. Shu, H., You, Z.: Application of Decision Attribute Classification and Mining Algorithm Based on Information Entropy. Computer engineering and application 01, 186–189 (2004)

    Google Scholar 

  12. Hrycej, T.: Identifying Chaotic Attractors with Neural Networks. In: Proceedings of IEEE International Conference on Neural Network, pp. 2664–2668 (1995)

    Google Scholar 

  13. Castro, L., Timmis, J.: Artificial Immune System. A Novel Computational Intelligence Approach. Springer, London (2002)

    MATH  Google Scholar 

  14. Li, T.: A Dynamic Intrusion Detection Model Based on Immune. Science bulletin 50, 17 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Yong Gan Vitoantonio Bevilacqua Juan Carlos Figueroa

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qin, J., Si, Q., Yan, H., Yan, F. (2011). A Trojan Detector Generating Algorithm Based on Chaotic Theory. In: Huang, DS., Gan, Y., Bevilacqua, V., Figueroa, J.C. (eds) Advanced Intelligent Computing. ICIC 2011. Lecture Notes in Computer Science, vol 6838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24728-6_68

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24728-6_68

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24727-9

  • Online ISBN: 978-3-642-24728-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics