• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intrusion detection based on rough set and artificial immune①

    2016-12-22 05:45:36ZhangLingSunHaiyanCuiJiantaoYangHuaHuangYan
    High Technology Letters 2016年4期

    Zhang Ling(張 玲)Sun Haiyan, Cui Jiantao, Yang Hua, Huang Yan

    (Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou 450001, P.R.China)

    ?

    Intrusion detection based on rough set and artificial immune①

    Zhang Ling(張 玲)②Sun Haiyan, Cui Jiantao, Yang Hua, Huang Yan

    (Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou 450001, P.R.China)

    In order to increase intrusion detection rate and decrease false positive detection rate, a novel intrusion detection algorithm based on rough set and artificial immune (RSAI-IDA) is proposed. Using artificial immune in intrusion detection, anomaly actions are detected adaptively, and with rough set, effective antibodies can be obtained. A scheme, in which antibodies are partly generated randomly and others are from the artificial immune algorithm, is applied to ensure the antibodies diversity. Finally, simulations of RSAI-IDA and comparisons with other algorithms are given. The experimental results illustrate that the novel algorithm achieves more effective performances on anomaly intrusion detection, where the algorithm’s time complexity decreases, the true positive detection rate increases, and the false positive detection rate is decreased.

    rough set, artificial immune, anomaly intrusion detection, rough set and artificial immune (RSAI-IDA)

    0 Introduction

    Intrusion detection system (IDS) is to detect unwanted attempts at accessing, manipulating and disabling computer system by either authorized users or external perpetrators, mainly through the network, such as the Internet. The true positive detection rate and false positive detection rate are two important evaluation criteria for judging the performances of intrusion detection system[1].

    Recently, many techniques have been proposed on IDS to reduce false positive detection rate and increase true positive detection rate, such as neural network, fuzzy theory, genetic algorithm, rough set algorithm (RSA), artificial immune theory, etc[2,3].

    While most solutions for network security are static, which collect, analyze and extract evidences after attacks[4,5]. Therefore, they lack the abilities of self-learning and self-adapting. However artificial immune system (AIS) is evolved from a biological immune system, which has some particular features: distribution, adaptability and real-time capability.

    In 1974, American biologist, therapist and immunologist, Jerne (Jerne N K) put forward an immune network theory, and won the Nobel Prize in medicine in 1986. Matzinger firstly put forward a danger theory, who proposed that the immune response in a human body was not caused by nonself antigens, but by danger signals when the cells were dead unnaturally in body. In AIS, dendritic cells (DC) can anomaly detect the antigens in real-time. DCs are sensitive to both signal types and have the ability to stimulate or suppress the adaptive immune system. DCs are the intrusion detection agents of the artificial immune system, policing the tissue for potential sources of damage in the form of signals and for potential culprits responsible for the damage in the form of ‘a(chǎn)ntigen’. Antigens are proteins which can be ‘presented’ to adaptive immune system by DCs, and belong to pathogens or the host. Many scholars have carried out many studies on AIS in actual engineering. Thus, AIS is applied in anomaly detection.

    Aickelin of University of Nottingham introduced the danger theory into AIS for the first time. On the 4th International Conference of Artificial Immunology in 2005, Greensmith et al put forward a new algorithm based on the “danger theory”——dendritic cell algorithm (DCA). DCA was applied in the intrusion detection system[6].

    Wang designed a new multi-agent immune detection model using vaccine based on the danger theory and applied the model to deal with problems on coo-perative air-defense of surface warship formation[7]. The main contribution of Ref.[7] is to use the danger theory to enhance system adaptability[7].

    In Ref.[8], Suha applied a genetic algorithm and a dynamic clonal selection algorithm to detect virus in computer system and achieved good result.

    In Ref.[9], enlightened by the similarity between the biological immune and antibody concentration when invasions happened in the network flow model, Zeng put forward a new intrusion detection method to reduce the rate of false positives while not affecting the detection rate.

    In Ref.[10], agent-based artificial immune system (ABAIS) was used in the intrusion detection system. The agent-based IDS (ABIDS) was inspired by the danger theory of human immune system. In ABIDS, multiple agents were proposed, meanwhile, agents coordinated each other to calculate mature context antigen value (MCAV). The experiments proved that malicious attacks were detected by ABIDS from system calls directly by the agent-based dendritic cell algorithm.

    Ref.[11] proposed a self set optimization algorithm using the modified clustering algorithm and Gaussian distribution theory. The results showed that the optimized method could solve the problem of boundary holes, increase the efficiency of detector generation effectively, and improve the system’s detection rate.In Ref.[12], an integrated artificial immune system (IAIS) was proposed. The DCA and negative selection algorithm (NSA) were embedded in IAIS. DCA was used to detect behavioral features. NSA was used to detect structural features.

    The problems of traditional detection algorithms are as follows: the computational complexity is high for the anomaly detection, so it is necessary to reduce the unimportant attributes; the method by which detectors are randomly generated may lead to slow function convergence. To solve these problems, some improvements will be done with the traditional algorithms. In this paper, first, the decision information table based on the immune theory will be redefined; second, the method of discernibility matrix is adopted to obtain effective antibody; third, in order to ensure the diversity of the antibody, part of the antibody are generated randomly.

    The arrangement of this paper is as follows. In Section 1, the basic definitions such as antigen, antibody, affinity of antigen and antibody and the redefinition of antibody information decision table are introduced. In Section 2, an improved immune intrusion detection algorithm is given, the algorithmic complexity is shown and the comparison with other algorithms is discussed. In Section 3, some parameters are given by the experiment. Finally, the true detection rate and false positive detection rate are compared with other algorithms. In Section 4, conclusions are given.

    1 The basic definitions

    RSAI-IDA designed in this paper is inspired by AIS and RSA. In this section, the related definitions are given in Subsection 1.1, and the antibody information decision table and antibody information discernibility matrix are defined based on Rough Set theory in Subsection 1.2.

    1.1 Preliminary knowledge

    Definition 1 Antigen ag∈Ag, Ag?D, D={0,1}l(l∈N, l>0), where Ag is the set of antigens. D is the binary character string of length l, the value of antigen (Ag) denotes the characteristics of behavior.

    Definition 2 The antibody set is defined as: Ab{}, d∈D, ag∈N, ab∈Ab, s∈{00,01,10}, where Ab is the set of antibodies, ab.s is state of antibody, whose values are 00, 01 or 10, ab.g is the age of antibody, ab.c is the matching numbers of antibody and antigen, N is positive integer. Ab=AbI∪AbT∪AbM. AbIis the immature antibodies set , AbTis the set of mature antibodies, AbMis the set of memory antibodies.

    The set of Sfcombines all data of normal behavior characteristics, Nfset combines all the data of abnormal behaviors’ characteristics, Sf∩Nf=?.

    The affinity represents the bonding strength between antigen and antibody, the function of affinity is shown as Eq.(1). The methods of calculating affinity between antibodies and antigens include: hamming distance, Euclidean distance, Manhattan distance, r-contiguous bites matching, etc.

    The affinity between antigen and antibody is calculated with Euclidean distance, shown as

    (1)

    In Eq.(1), xiis the ith feature of antigen x, yiis the ith feature of antibody.

    DCs receive four types of antigen signals: pathogen associated molecular pattern (PAMP), which is the abnormal behavior; safe signal which is representative of normal mode, the enhancement of this signal represents that it is more possible that the behavior is normal; danger signal, which indicates that the behavior may be abnormal, if the signal increases, the more possibility of abnormal behavior may occur; inflammation signal, the signal is used for signal amplification. The preprocessing of the input signals is referred to Ref.[12].

    In organization, DCs collect antigen signals (PAMP, safe signals, danger signals), and work out the three output signals: coordinating stimulus signals (CSM), semi mature signals (SEMI) and mature signals (MAT).The formula is shown in Eq.(2), by which the input signals are converted to the output signals. The recommended weight values of formula are given in Section 2.

    C[CSM,SEMI,MAT]=

    (2)

    If the cumulative value of CSM is greater than the DC’s migration threshold which is defined beforehand, DCs migrate to the lymph nodes, and mature dendritic cells are capable of presenting antigen to T cells and activated T cells leading to release of cytokines. The antigens and DCs’ states are recorded, and the new DC is added into organization. Each antigen’s mature context antigen value (MCAV) is calculated by Eq.(4). The abnormal antigens whose matching radius excesses the threshold will be dealt with by the security operation center (SOC).

    Definition 3. Dynamic anomaly index is calculated with

    (3)

    In Eq.(3), α is the antigens dataset in which all the decision attribute values are same, mais the total number of mature antigens whose type is α and presented to the lymph nodes. Aiis the sum of antigens which is the ith type and presented to mature cells, A is the total sum of antigens’ types.

    Definition 4 Antigen’s matching threshold is defined in Eq.(4)[12].

    Ya=(L-ε)×e-?(Ca-δ)

    (4)

    In Eq.(4), L is the length of detector, the type of ? is constant, δ is the anomaly threshold in anomaly detection, ε is self’s radius, Cais the dynamic anomaly indicators, for memory detector, the value of ? is set at a greater value.

    1.2 Antibody information decision table

    In 1982, rough set theory was put forward by Pawlak, who was a scientist of Poland Warsaw Polytechnic University. Attribution reduction is one of the most important contents[13]. After many years’ development, rough set and other disciplines are combined in the areas of research such as knowledge discovery[14,15].

    In rough set theory, the information system is also called a decision table. Referring to Definition 1 and Definition 2, antibody information decision table, the equivalence relation, approximation, antibodies attribute dependency and attribute importance are defined as follows:

    Definition 5 An antibody information system is defined as DT=, where:

    U={ab1,ab2,…,abn}, U≠φ, ab1, ab2,…,abnare antibodies, U is finite set.

    C={a1,a2,…am}, C is conditional attributes subset.

    D is decision attributes subset, and A=C∪D; C∩D=?.

    f: U×A→V, f is an information function, for any ?a∈C∪D; x∈U and f(x,a)∈Va.

    Definition 6 An antibody information decision table DT=, A=C∪D, ?B?A, Ab?U, B*(Ab) is the lower approximation of the antibody set Ab, the positive domain of decision attribute D is defined as

    (5)

    Definition 7 An antibody information decision table is defined as DT=, whose discernibility matrix is MD(B).

    MD(B)={MD(i, j)}n×n.

    1≤i, j≤n=|U/IND(B)|

    (6)

    MD(i, j) is the ith column and the jth row element, IND(B) is referred to Ref.[14].

    MD(i, j)=

    (7)

    Symbol ak(abj) is the value of sample abjabout attribute ak, d(abj) is the value of sample abjabout decision attribute ak, i, j=1,2…,n, MD(i, j) is the attributes set, which shows that two values on the classes are different to the attributes set. Any discernibility matrix MD(B) can uniquely identify a discernibility function by the element MD(i, j).

    i, j=1,2,…,n.

    (8)

    2 RSAI-IDA

    Synthesizing the dendritic cell algorithm and negative selection algorithm, two measures are applied to improve intrusion detection’s performances. Rough set theory is introduced to train data and get decision rules. In order to improve the diversity of antibodies, the improved algorithm includes two methods: getting the detectors partly by training with random function.

    RSAI-IDA.

    Input:connectioninstances:I={i1,i2,…,in}Output:clusters:C={c1,c2,…,ck}1.PreprocessloginformationtogetdecisionrulestableU={ab1,ab2,…,abn}2.Reduceredundantattributes3.GenerateintrusiondetectionruleswithRSA4.Rulesaredividedintoself?rulesandnon?self?rulesaccord?ingtodecisionattribute5.Misusedetection6.GeneratedetectorswithNSA7.DCsgetantigensignals8.ProcessantigenandsignalswithDCA9.Analysesignalsinreal?timetogainabnormalindex10.Accordingtothedynamicanomalyindexcalculatematc?hingthresholdvalue11.PerformanomalydetectionwithNSA12.Producethealarmsignals

    2.1 Key sections

    There are four key sections in RSAI-IDA, which are described as below:

    (1) First, according to Definition 1, Definition 2 and Definition 5, preprocess the training data to obtain the antibody information decision table, and judge whether the decision table information is complete. If there are some elements which are absent, then fill the absence to delete duplicates. Second, generate equivalence classes using Definition 6 and Definition 7, and calculate with identification function to get the discernibility matrix. Third, judge whether the attributes in the decision table need reduction according to attributes class projection. If the attribute is not important, then reduce the unimportant attributes. Fourth, get the simplest antibody decision table, and generate decision rules, finally, select the decision rules whose decision attribute value is ‘0’, and sort the rules by numbers of rule matching, and store the autologous rules. The flow chart of generating rules is shown in Fig.1.

    (2) Generate candidate detectors randomly, calculate the affinities between each detector and all mature detectors. If the affinity is smaller than the self-radius, then remove the candidate detector, otherwise the candidate detector is added to the mature detectors set. If the total number of detectors is equal to the self given threshold value, then obtain a set of mature detectors. The flow chart of generating detectors is shown in Fig.2.

    Fig.1 The flow chart of generating rules

    Fig.2 The flow chart of generating detectors

    (3) At First, obtain and normalize signals of antigens, store in the antigen input signal matrix. And then, calculate the input signals and get the output signals with Eq.(2), if the cumulative value of CSM is greater than migration threshold, and the cumulative mature value is greater than the semi-mature value, DC becomes mature, and migrates to the lymph nodes, at the same time, a new dendritic cell is added into the organization, else it continues to collect new signals. At last, statistics is done to mature DCs and calculation is given to the anomaly index with Eq.(3). By Eq.(4), work out matching threshold value. The flow chart of calculating anomaly index is shown in Fig.3.

    Fig.3 The flow chart of calculating anomaly index

    (4) Collect antigens and calculate the affinity of the antigens and detectors with Eq.(1). If the affinity is greater than the threshold value which is given in section 3 , then the antigen is judged as nonself, and generate an alarm in Security Operation Center. If the affinity is less than the threshold value, then the antigen is self-one, and replace the mature detector using the principle of least recently used.

    2.2 Algorithm’s complexity

    According to the improved algorithm in this Subsection 2.1, the algorithm’s time complexity and space complexity are given in this subsection.

    The parameters are given as: let the number of condition attributes of decision table be M, the number of decision attribute value be 2, the number of training samples be N1, total number of antigens which are to be detected be N, the length of detector be L, and L1is the length of input antigen signal.

    Table 1 The complexity of algorithms

    From Table 1, in comparison with DCA, NSA and IAIS, the time complexity of the algorithm is lower than DCA, NSA and IAIS, but space complexity is a little higher than other algorithms. In the training stage, space complexity increases, but the detection speed is a higher. So, it is worth consuming the space. While in the process of detecting the antigens, the space complexity is the same.

    3 Simulations and experimental results

    The experimental results are evaluated by the true positive detection rate (TP) and the false positive detection rate (FP). They are two important evaluation criterions for judging the performances of intrusion detection system.

    In this section, the processing of experiment data sets and some simple parameters are given in Subsection 3.1. The two important parameters are shown in Subsection 3.2 and Subsection 3.3. With RSA, the length of detectors is obtained in Subsection 3.2. When the values of detector’s radius are between 0 and 16, TP and FP are shown in Subsection 3.3, in which, the detector’s radius is determined. In subsection 3.4, the anomaly detection results are given using the parameters above. In Subsection 3.5, comparisons of performances of different algorithms are shown.

    The algorithm’s code is written with C language, and all the experiments are simulated in the Linux system (Intel Pentium Dual CPU E2180, 2G RAM).

    3.1 Experimential datasets

    In this study, the experiential data are from “10% KDD 99” dataset. 300 million data are adopted in the simulations, the definition of data fields are referred to Ref.[15]. About 10% of the training data are denoted as S. Dataset S is divided into two parts, 20% of the data are combined in set S1, which are used for training to get decision rules, others (80% of the data set) are included in set S2, which are used as testing data divided into 5 groups, as T1, T2, T3, T4and T5. Each set has 4800 data. The timestamp will be added to each record in order to simulate the detection that one record is sampled per second.

    1) Antigens

    The data domains are converted to binary strings which are used to represent antigen, and the methods of conversation are shown in Table 2.

    Table 2 The table of antigens’ construction

    2)Input antigen signals

    The method which is used to obtain the input antigen signals is referred in Refs[12,14]. The 10 types of data domains are divided into three types as follows:

    PAMP: serror rate, srv serror rate, same srv rate, dst host same src port rate and dst host serror rate.

    Danger signals: count and srv count.

    Safe signals: logged in, srv diff host and dst host count.

    Let x be the value of data domain. If the system is abnormal and the value of x is in [m, n], then the signal is safe. The method of processing the data is shown as Eq.(9), which is adopted to normalize the antigens signals, which are converted into [0,100].

    (9)

    In Eq.(9), m is the smallest one of the data domains, and n is the biggest one.

    3)The parameters

    In experiments, the number of dendritic cells is set as 10; each dendritic cell collect 500 antigens; migration threshold is 300; the anomaly threshold is 0.35; the value of ? is constant, when the detector is memory one, ? is 1, ordinary detector has a value of 0.5; the length of detector L is given in subsection 3.2; the recommended weights of Eq.(2) are shown in Table 3.

    Table 3 Recommend weights

    3.2 The length of detectors

    There are 41 conditional attributes in the decision table, while some attributes are unimportant, if all the attributes are considered in detection, the time complexity and space complexity will increase. So it is necessary to delete the unimportant attributes.

    The reduction algorithm based on rough set theory is used to deal with the antibody information decision table S1, and to get the simplest decision table.

    After reduction, there are 11 attributes, which are: 2,3,4, 25,26,28,29,30,31,35,36. In Table 4, the decision rules before and after reduction are given, after reduction, the length of antibodies L is 30.

    Table 4 The number of decision rules

    In Table 4, before reduction, there are 1258 self-antigens and 4742 nonself-antigen. With RSA, the number of self-antigens is 315, the number of nonself-antigens is 896.

    After reduction, the number of antibody decision rules obviously decreases. In accordance with the important degree of rules, all the decision rules whose decision attribute value is 0, and all the rules are sorted by matching number from high to low.

    3.3 The detectors’ radius

    Receive operation curve (ROC) is applied to describe the intrusion detection performances and the relationship of the true positive detection rate and the false positive detection rate. Each point represents a value of detector’s radius length, plotted by the false positive detection rate on the horizontal axis and the true positive detection rate on the vertical. The datasets S2of KDD99 are employed in this experiment for testing, and each test is repeated for 10 times, all the results are averaged, which are shown by ROC curves.

    The value of self’s radius ε determines the coverage of each detector. When ε is 0, the antigen and detector are matching exactly. When the affinity between antigen and the detector is greater than “L-ε”, the detector and antigen are considered to be matching.

    In order to study how the artificial immune performances varies when the self’s radius have different values, the self’s radius are set to different values separately, and calculate the corresponding TP and FT. The results are shown in Fig.4.

    Fig.4 The receive operation curve

    The results are shown in Fig.4, when ε is 0, TP is about 0.592, and FP is 0.013; when ε is 10, TP is about 0.9483, and FP is 0.051; when ε is 11, TP is about 0.9491, and FP is 0.062. With increasing of value ε, FP increases too. When ε is 10, the area of the curve is the greatest, but when the value of ε is higher, TP is nearly unchanged, while FT grows. According to ROC curve in Fig.4, the value of ε is set as 10, namely self’s radius is 10.5.

    3.4 True positive detection rate and false positive detection rate

    In Subsection 3.3, the testing dataset is S2, which is from 80% KDD99 datasets. In this section, the algorithm is to be emulated which has been proposed in Section 2. In the experiment, the value of L is 30, which is obtained in Subsection 3.2, ε is 10.5, which is shown in Subsection 3.3. Datasets S2are divided into five groups, and each group is applied for testing 10 times. And the values of TP and FP are calculated to get the average, which are used to evaluate the performances of RSAI-IDA. The simulation results are shown in Table 5.

    Table 5 The TP and FP of detection

    As can be seen from Table 5, the average value of TP is above 0.96902, and the mean variance of TP is 0.00266; the average value of FP is above 0.03912, and the mean variance of FP is 0.0024. The five simulation results are similar, so it is concluded that the algorithm is stable, to detect the abnormal behaviors in real time.

    3.5 Comparison of performances

    In Section 2, the various detection algorithms’ time complexity and space complexity are compared. This subsection, for dataset S2, the average of TP and FP is taken and the two are compared with the negative selection algorithm, the dendritic cell algorithm and integrated immune algorithm. Though the methods of each experiment’s settings are not identical, the true positive detection rate and false positive detection rate are shown in Table 6.

    Table 6 Comparisons of different algorithms

    From Table 6, the improved algorithm is compared with the optimization algorithm with Gaussian distribution optimization algorithm, the TP decrease by 0.42%, false alarm rate increase by about 0.43%, but the detection data in Ref.[11] is much less. Compared with DCA, TP is increased by more than 22%, and FP is increased by 2.68%. Through comparison with the above two algorithms, both of the true positive detection rate and the false positive rate are increased. Compared with IAIS, the true positive detection rate reduces and the false positive detection rates are equal.

    4 Conclusions

    The artificial immune algorithms (NSA, DCA, IAIS) are proved to be effective methods which are used in real-time intrusion detection. While there are two problems of the traditional detection algorithms: the detection rate of DCA is low; the other two algorithms’ time complexities are high. In this paper, after analyzing DCA and IAIS algorithm, an improved algorithm (RSAI-IDA) is proposed, and it’s time complexity and space complexity are discussed. The time complexity is lower but space complexity is higher. In the training stage, space complexity increases, but the detection speed is higher. So, it is worth sacrificing some memory, and in the process of detection, the space complexity is equal.

    The detection performances of RSAI-IDA are validated on KDD 99 dataset. Since there are many parameters of algorithm, only the values of some key parameters are analyzed. The length of the detector and self’s radius are discussed with the simulations respectively. Finally, comparisons with the classical algorithms are given. The results show that RSAI-IDA algorithm, integrated the NSA and DCA, is effective for real-time detection. Rough set method is applied to obtain effective antibody, increase antigen detection rate, and the method of the random function to obtain parts of antibodies is to ensure the diversity of antibodies and decrease FP. All in conclusion, RSAI-IDA can be effectively used for anomaly detection, which can improve the speed of the intrusion detection and reduce the rate of false positives.

    [ 1] Denning, Dorothy E. An intrusion detection model. IEEE Transaction on Software Engineer, 1987,13: 222-232

    [ 2] Sperotto A, Sadre R. Autonomic parameter tuning of anomaly-based IDSs: an SSH case study. IEEE Transactionson Network and Service Management, 2012, 9(2):128-141

    [ 3] Jiang F, Sui Y F, Cao C G. An incremental decision tree algorithm based on rough sets and its application in intrusion detection. Artificial Intelligence Review, 2013, 40(4): 517-530

    [ 4] Kabir M M, Shahjahan M, Murase K. A new hybrid ant colony optimization algorithm for feature selection. Elsevier-Expert Systems,2012, 39(3): 3747-3763

    [ 5] Li S C, Yun X C, Zhang Y Z. Anomaly-based model for detecting HTTP-tunnel traffic using network behavior analysis. High Technology Letters, 2014, 20(1):63-69

    [ 6] Greensmith J, Aickelin U, Cayzer S. Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS), Springer, LNCS 3627, 2005. 153-167

    [ 7] Wang J, Zhao X Z, Xu B, et al. Immune multi-agent model using vaccine for cooperative air-defense system of systems for surface warship formation based on danger theory. Journal of Systems Engineering and Electronics, 2013, 24(6): 946-953

    [ 8] Suha A, Raed A, Alaa A. Virus detection using clonal selection algorithm with genetic algorithm. Applied Soft Computing, 2013, 13(1):239-246

    [ 9] Zeng J, Liu X J, Li T, et al. A novel intrusion detection approach learned from the change of antibody concentration in biological immune response. Springer Applied Intelligence, 2011, 35(1):41-62

    [10] Ou C M. Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neuro computing, 2012, 88(1):78-86

    [11] Zhang F B, Xi L, wang S W. Real-valued multi--area self set optimization in immunity-based network intrusion detection system. High Technology Letters,2014,18(1):1-6

    [12] Chen Y B, Feng C, Zhang Q. Integrated artificial immune system for intrusion detection. Journal on Communications, 2012, 33:125-131 (In Chinese)

    [13] Pawlak Z. Rough sets. International Journal of Computer and Information Science, 1982, 11:341-356

    [14] Zhang L, Bai Z, Lu Y, et al. Integrated intrusion detection model based on artificial immune. Journal of China Universities of Posts and Telecommunications, 2014, 21(2): 83-90

    [15] Qian J, Miao D Q, Zhang Z H. Knowledge reduction algorithms in cloud computing. Chinese Journal Computers, 2011, 34:2332-2343 (In Chinese)

    Zhang Ling, born in 1979. She received the Ph.D degree from Beijing University of Posts and Telecommunications in 2014. Her main researches are network security, artificial intelligence and cloud computing.

    10.3772/j.issn.1006-6748.2016.04.005

    ① Supported by the National Natural Science Foundation of China (No. 61502436), the Science and Technology Project of Henan Province (No. 152102210146) and the Doctoral Fund for the Central Universities (No. 2014BSJJ084).

    ② To whom correspondence should be addressed. E-mail: ll790217@163.com Received on May 18, 2015

    亚洲欧美日韩东京热| 少妇猛男粗大的猛烈进出视频 | 少妇的逼水好多| kizo精华| 午夜精品一区二区三区免费看| 亚洲美女搞黄在线观看| 亚洲av成人精品一区久久| 日本一本二区三区精品| 啦啦啦观看免费观看视频高清| 人妻制服诱惑在线中文字幕| 中文字幕av成人在线电影| 美女黄网站色视频| 国产精华一区二区三区| 级片在线观看| 欧美激情久久久久久爽电影| 成人三级黄色视频| 综合色av麻豆| 国产精品一区www在线观看| 高清毛片免费看| 内射极品少妇av片p| 男人舔奶头视频| 国产精品一及| 18禁在线无遮挡免费观看视频| 99久国产av精品| 国产又色又爽无遮挡免| 日本五十路高清| 亚洲国产欧美人成| 久久久色成人| 一级毛片aaaaaa免费看小| 你懂的网址亚洲精品在线观看 | 亚洲人成网站高清观看| 麻豆久久精品国产亚洲av| 久久久久久伊人网av| 日日摸夜夜添夜夜爱| 国产亚洲一区二区精品| 免费av观看视频| 边亲边吃奶的免费视频| 国产精品人妻久久久影院| 一边摸一边抽搐一进一小说| 欧美高清性xxxxhd video| 国产成人freesex在线| 国产精品国产三级专区第一集| 亚洲内射少妇av| 大香蕉97超碰在线| 国产大屁股一区二区在线视频| 欧美激情久久久久久爽电影| 精品一区二区免费观看| 2021少妇久久久久久久久久久| 国产精品永久免费网站| 欧美日韩综合久久久久久| 久久精品久久久久久噜噜老黄 | 成年女人看的毛片在线观看| 亚洲av.av天堂| 岛国在线免费视频观看| 直男gayav资源| 欧美不卡视频在线免费观看| 亚洲成人中文字幕在线播放| 一个人观看的视频www高清免费观看| 特大巨黑吊av在线直播| 国产精品.久久久| av免费观看日本| 搡老妇女老女人老熟妇| 99热这里只有精品一区| 亚洲成人av在线免费| 国内揄拍国产精品人妻在线| 美女内射精品一级片tv| 国产久久久一区二区三区| 黄色一级大片看看| 国产精品一及| 在线免费十八禁| 美女被艹到高潮喷水动态| 人妻夜夜爽99麻豆av| 黑人高潮一二区| 国产亚洲av嫩草精品影院| av黄色大香蕉| 免费观看在线日韩| 国产一区二区在线av高清观看| 乱系列少妇在线播放| 天堂网av新在线| 免费观看在线日韩| 亚洲精品国产成人久久av| 久久精品夜色国产| 搞女人的毛片| 亚洲欧洲国产日韩| av卡一久久| 水蜜桃什么品种好| 天堂影院成人在线观看| 亚洲精品乱码久久久v下载方式| 国产精品国产三级国产专区5o | 国产v大片淫在线免费观看| 国产 一区 欧美 日韩| 国产伦理片在线播放av一区| 看十八女毛片水多多多| 亚洲国产精品合色在线| 美女脱内裤让男人舔精品视频| 日本五十路高清| av又黄又爽大尺度在线免费看 | 麻豆国产97在线/欧美| 国产老妇伦熟女老妇高清| 黄色欧美视频在线观看| 国内少妇人妻偷人精品xxx网站| 丰满乱子伦码专区| 国产成人aa在线观看| 国产成人午夜福利电影在线观看| 免费观看a级毛片全部| 少妇猛男粗大的猛烈进出视频 | 麻豆乱淫一区二区| 国内精品一区二区在线观看| 成人av在线播放网站| 精品无人区乱码1区二区| 国产美女午夜福利| 2022亚洲国产成人精品| 最新中文字幕久久久久| 丰满人妻一区二区三区视频av| 舔av片在线| 两个人视频免费观看高清| 三级毛片av免费| 国产成人精品一,二区| 人妻制服诱惑在线中文字幕| 在线a可以看的网站| 国产精品久久久久久久电影| 边亲边吃奶的免费视频| 欧美日本亚洲视频在线播放| 99久久精品热视频| 色综合站精品国产| 免费大片18禁| 亚洲四区av| 午夜精品在线福利| 精品99又大又爽又粗少妇毛片| 99久久精品一区二区三区| 国产精品国产高清国产av| 中文字幕av成人在线电影| 色噜噜av男人的天堂激情| 综合色av麻豆| 午夜精品在线福利| 18禁动态无遮挡网站| 日韩一区二区视频免费看| 在线天堂最新版资源| 男女边吃奶边做爰视频| 晚上一个人看的免费电影| 美女脱内裤让男人舔精品视频| 国产亚洲91精品色在线| 极品教师在线视频| 一区二区三区高清视频在线| 国产黄片视频在线免费观看| 99热这里只有是精品50| 神马国产精品三级电影在线观看| 免费搜索国产男女视频| 国产精品野战在线观看| 国产不卡一卡二| 97热精品久久久久久| 久久久精品大字幕| 免费观看a级毛片全部| 18禁裸乳无遮挡免费网站照片| 天堂网av新在线| 蜜臀久久99精品久久宅男| 岛国在线免费视频观看| 大又大粗又爽又黄少妇毛片口| 亚洲真实伦在线观看| 国产高清有码在线观看视频| 国产淫语在线视频| 亚洲av成人精品一二三区| 日韩亚洲欧美综合| 99久久九九国产精品国产免费| 黑人高潮一二区| 少妇熟女欧美另类| 亚洲性久久影院| 午夜a级毛片| 午夜精品在线福利| 99久久九九国产精品国产免费| 国产一区亚洲一区在线观看| 久久精品久久久久久久性| 国产高清不卡午夜福利| 国产亚洲午夜精品一区二区久久 | 国产亚洲91精品色在线| 欧美3d第一页| 两个人的视频大全免费| 99九九线精品视频在线观看视频| 十八禁国产超污无遮挡网站| 亚洲精品成人久久久久久| 性色avwww在线观看| 看片在线看免费视频| 波多野结衣高清无吗| 一区二区三区四区激情视频| 国产探花在线观看一区二区| 寂寞人妻少妇视频99o| 九九久久精品国产亚洲av麻豆| h日本视频在线播放| 久久久午夜欧美精品| 国产成人91sexporn| 最近中文字幕高清免费大全6| 精品无人区乱码1区二区| 精品久久久久久久久久久久久| 国产精品一区二区三区四区免费观看| 亚洲精品自拍成人| 精品一区二区免费观看| 日本免费a在线| 51国产日韩欧美| 青春草视频在线免费观看| 在线观看66精品国产| 午夜福利在线在线| 亚洲精品色激情综合| 久久午夜福利片| 中文字幕免费在线视频6| 亚洲国产日韩欧美精品在线观看| 日本免费一区二区三区高清不卡| 久久人人爽人人爽人人片va| 男插女下体视频免费在线播放| 亚洲天堂国产精品一区在线| 99久久九九国产精品国产免费| 人人妻人人澡欧美一区二区| 18禁在线无遮挡免费观看视频| 麻豆一二三区av精品| 婷婷六月久久综合丁香| 又爽又黄无遮挡网站| 天堂中文最新版在线下载 | 三级男女做爰猛烈吃奶摸视频| 男女国产视频网站| 国产日韩欧美在线精品| 日韩精品青青久久久久久| 成人特级av手机在线观看| 别揉我奶头 嗯啊视频| 女人久久www免费人成看片 | 久久久久免费精品人妻一区二区| 精品午夜福利在线看| 欧美丝袜亚洲另类| 国产老妇女一区| 我要看日韩黄色一级片| 国产日韩欧美在线精品| 精品久久久久久电影网 | 男人舔女人下体高潮全视频| 成年免费大片在线观看| 亚洲中文字幕一区二区三区有码在线看| 精品免费久久久久久久清纯| 亚洲成av人片在线播放无| 精品一区二区免费观看| 99久国产av精品| 国产爱豆传媒在线观看| a级毛色黄片| 日韩成人伦理影院| 亚洲18禁久久av| 最近的中文字幕免费完整| 亚洲欧美成人精品一区二区| 国产午夜精品论理片| 联通29元200g的流量卡| 亚洲,欧美,日韩| 国产精品福利在线免费观看| 免费大片18禁| 少妇熟女欧美另类| 欧美日本视频| 纵有疾风起免费观看全集完整版 | 夫妻性生交免费视频一级片| 国产伦精品一区二区三区视频9| 中国国产av一级| 99热全是精品| 联通29元200g的流量卡| 成人毛片a级毛片在线播放| 国产精品三级大全| 久99久视频精品免费| 国产成人午夜福利电影在线观看| 免费看a级黄色片| 一夜夜www| 欧美3d第一页| 美女脱内裤让男人舔精品视频| 狂野欧美激情性xxxx在线观看| 蜜桃久久精品国产亚洲av| 男的添女的下面高潮视频| 深爱激情五月婷婷| 久久久久久久国产电影| 汤姆久久久久久久影院中文字幕 | 亚洲国产色片| 高清毛片免费看| 亚洲国产高清在线一区二区三| 久久99热这里只频精品6学生 | 亚洲国产精品专区欧美| 女的被弄到高潮叫床怎么办| 免费看a级黄色片| 在线免费十八禁| 国产老妇女一区| 两个人视频免费观看高清| 久久久欧美国产精品| 最近最新中文字幕免费大全7| 国产精品蜜桃在线观看| 汤姆久久久久久久影院中文字幕 | 免费看av在线观看网站| 永久免费av网站大全| 能在线免费看毛片的网站| 国产精品乱码一区二三区的特点| 最近视频中文字幕2019在线8| 中文字幕久久专区| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 在线免费观看的www视频| 又爽又黄无遮挡网站| 日韩一本色道免费dvd| 国产亚洲精品久久久com| 久久亚洲国产成人精品v| 国产精品一区二区三区四区久久| av在线老鸭窝| 国产精品,欧美在线| 免费黄网站久久成人精品| 国产精品无大码| 日韩 亚洲 欧美在线| 亚洲第一区二区三区不卡| 丝袜美腿在线中文| 女人久久www免费人成看片 | 高清午夜精品一区二区三区| 久久6这里有精品| 18+在线观看网站| 国产精品一区二区三区四区久久| 免费黄网站久久成人精品| 精品人妻视频免费看| 亚洲人与动物交配视频| 纵有疾风起免费观看全集完整版 | 一级黄片播放器| 91久久精品电影网| 91精品伊人久久大香线蕉| 精品少妇黑人巨大在线播放 | 国产精品一区二区在线观看99 | 国产精品久久视频播放| h日本视频在线播放| 精品免费久久久久久久清纯| 国产成人freesex在线| 成人漫画全彩无遮挡| 午夜视频国产福利| 国产精品爽爽va在线观看网站| 国产淫语在线视频| 有码 亚洲区| 国产色婷婷99| 精品久久久久久久久av| a级一级毛片免费在线观看| 又粗又硬又长又爽又黄的视频| 午夜久久久久精精品| 欧美bdsm另类| 免费看av在线观看网站| 久久国产乱子免费精品| 国产精品蜜桃在线观看| 少妇丰满av| 欧美3d第一页| av免费观看日本| 女人被狂操c到高潮| 免费看a级黄色片| 久久人人爽人人片av| 欧美一区二区精品小视频在线| 99久久精品国产国产毛片| 欧美日韩综合久久久久久| 性插视频无遮挡在线免费观看| 两性午夜刺激爽爽歪歪视频在线观看| 日本午夜av视频| 又爽又黄无遮挡网站| 日本与韩国留学比较| a级毛色黄片| 蜜臀久久99精品久久宅男| 免费黄色在线免费观看| 国产三级中文精品| 国产视频内射| 成人三级黄色视频| 成人亚洲精品av一区二区| 哪个播放器可以免费观看大片| 男人狂女人下面高潮的视频| 日本午夜av视频| 国产一级毛片在线| 久久99精品国语久久久| 国产黄色视频一区二区在线观看 | 午夜精品国产一区二区电影 | 国产精品.久久久| 久久6这里有精品| 久久久久国产网址| 六月丁香七月| 亚洲中文字幕日韩| 国产片特级美女逼逼视频| 国产免费一级a男人的天堂| 老司机影院成人| 熟女电影av网| 岛国在线免费视频观看| 国产亚洲精品av在线| a级毛片免费高清观看在线播放| 成人鲁丝片一二三区免费| 成年女人看的毛片在线观看| 麻豆成人午夜福利视频| 日韩精品青青久久久久久| 99热6这里只有精品| 日韩人妻高清精品专区| 久久99热6这里只有精品| 亚洲乱码一区二区免费版| 啦啦啦啦在线视频资源| 少妇丰满av| 亚洲国产精品久久男人天堂| 亚洲一级一片aⅴ在线观看| av黄色大香蕉| 欧美精品国产亚洲| 国产精品野战在线观看| av在线天堂中文字幕| 欧美+日韩+精品| 最近中文字幕高清免费大全6| 国产精品人妻久久久久久| 99久久精品热视频| 一本一本综合久久| 国产色婷婷99| 美女大奶头视频| 18禁在线无遮挡免费观看视频| 人人妻人人看人人澡| 亚洲精品成人久久久久久| 精品欧美国产一区二区三| 欧美变态另类bdsm刘玥| av国产免费在线观看| 水蜜桃什么品种好| 欧美日本视频| 久久精品影院6| 亚洲欧美精品综合久久99| 国内少妇人妻偷人精品xxx网站| 中国国产av一级| 成人综合一区亚洲| 久久精品国产自在天天线| 非洲黑人性xxxx精品又粗又长| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲av成人av| 成年免费大片在线观看| av在线蜜桃| 岛国在线免费视频观看| 99久久精品一区二区三区| 亚洲国产精品专区欧美| 一级av片app| 在线观看av片永久免费下载| 免费观看人在逋| 免费av观看视频| 欧美精品国产亚洲| 国产又黄又爽又无遮挡在线| av免费观看日本| 干丝袜人妻中文字幕| 久久久久久九九精品二区国产| 丰满少妇做爰视频| 最近中文字幕2019免费版| 日韩高清综合在线| 欧美最新免费一区二区三区| 中文字幕熟女人妻在线| 高清视频免费观看一区二区 | 午夜激情福利司机影院| 免费观看a级毛片全部| 亚洲图色成人| 高清av免费在线| 国产精品野战在线观看| 搡老妇女老女人老熟妇| 国产老妇女一区| 99在线视频只有这里精品首页| 亚洲av中文av极速乱| 国产精品国产三级国产专区5o | 成人美女网站在线观看视频| 综合色av麻豆| 色综合色国产| 国产精品熟女久久久久浪| 男女啪啪激烈高潮av片| 晚上一个人看的免费电影| www.色视频.com| 亚洲av成人精品一区久久| 久久久精品94久久精品| 欧美成人免费av一区二区三区| 国内揄拍国产精品人妻在线| 欧美一级a爱片免费观看看| 九九热线精品视视频播放| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲国产最新在线播放| 久久热精品热| 女的被弄到高潮叫床怎么办| 日韩欧美三级三区| 日韩在线高清观看一区二区三区| 亚洲国产精品成人综合色| 欧美日韩一区二区视频在线观看视频在线 | 九九爱精品视频在线观看| 97超视频在线观看视频| 免费av观看视频| 国产高清国产精品国产三级 | 国模一区二区三区四区视频| 欧美高清成人免费视频www| 嫩草影院精品99| 51国产日韩欧美| 亚洲精品乱码久久久久久按摩| 国产中年淑女户外野战色| 日产精品乱码卡一卡2卡三| 51国产日韩欧美| 亚洲精品亚洲一区二区| 少妇人妻精品综合一区二区| av线在线观看网站| 中文天堂在线官网| 国语对白做爰xxxⅹ性视频网站| 伊人久久精品亚洲午夜| 日日撸夜夜添| 国产又黄又爽又无遮挡在线| 色吧在线观看| 国产在线一区二区三区精 | 亚洲18禁久久av| 亚洲不卡免费看| 亚洲一级一片aⅴ在线观看| 夜夜爽夜夜爽视频| 床上黄色一级片| 久久精品国产鲁丝片午夜精品| eeuss影院久久| 国语对白做爰xxxⅹ性视频网站| 国产熟女欧美一区二区| 69av精品久久久久久| 尾随美女入室| 超碰av人人做人人爽久久| 亚洲,欧美,日韩| 嫩草影院新地址| 九草在线视频观看| 久久99热这里只频精品6学生 | 亚洲综合色惰| 国产又黄又爽又无遮挡在线| 在线免费观看的www视频| 国产高清三级在线| 亚洲一级一片aⅴ在线观看| 最近最新中文字幕大全电影3| 在线免费观看的www视频| 国产日韩欧美在线精品| 又粗又硬又长又爽又黄的视频| 国产探花在线观看一区二区| 国产一区二区在线av高清观看| 免费一级毛片在线播放高清视频| 97在线视频观看| 免费av观看视频| 我要搜黄色片| 黄色配什么色好看| 男女视频在线观看网站免费| 国产精品国产高清国产av| 男女视频在线观看网站免费| 国产高清不卡午夜福利| 最近手机中文字幕大全| 国产免费福利视频在线观看| 在线免费十八禁| 又粗又爽又猛毛片免费看| 人妻系列 视频| 日本午夜av视频| 国产av一区在线观看免费| 亚洲国产欧洲综合997久久,| 精品久久久久久久人妻蜜臀av| 18禁在线播放成人免费| 特级一级黄色大片| 搡老妇女老女人老熟妇| 国产白丝娇喘喷水9色精品| 日韩成人av中文字幕在线观看| 欧美激情久久久久久爽电影| 亚洲婷婷狠狠爱综合网| 亚洲成人av在线免费| 99久国产av精品国产电影| 国产精品综合久久久久久久免费| 51国产日韩欧美| 久久99蜜桃精品久久| 中文字幕亚洲精品专区| www.色视频.com| 亚洲av成人精品一区久久| 色哟哟·www| 91精品一卡2卡3卡4卡| 嫩草影院新地址| av福利片在线观看| 午夜精品在线福利| 又粗又爽又猛毛片免费看| 欧美丝袜亚洲另类| 亚洲自拍偷在线| 又粗又硬又长又爽又黄的视频| 成人午夜精彩视频在线观看| 国产精品女同一区二区软件| 国产毛片a区久久久久| 少妇猛男粗大的猛烈进出视频 | 久久精品国产亚洲网站| 2021天堂中文幕一二区在线观| 久久久国产成人精品二区| 国产不卡一卡二| 中文在线观看免费www的网站| 黑人高潮一二区| 久久久精品大字幕| 欧美性猛交黑人性爽| 麻豆一二三区av精品| 亚洲av一区综合| 国产毛片a区久久久久| 日韩欧美精品免费久久| 国产精品综合久久久久久久免费| 成人鲁丝片一二三区免费| 亚洲欧洲国产日韩| 一级爰片在线观看| 亚洲精品国产成人久久av| 亚洲精华国产精华液的使用体验| 在线观看美女被高潮喷水网站| www.av在线官网国产| 久久久久九九精品影院| 久久久久久九九精品二区国产| 日韩一区二区三区影片| 最新中文字幕久久久久| 久久久国产成人精品二区| 精品久久久久久电影网 | av又黄又爽大尺度在线免费看 | 日本色播在线视频| 日本三级黄在线观看| 亚洲一级一片aⅴ在线观看| 啦啦啦观看免费观看视频高清| 中国国产av一级| 少妇高潮的动态图| 2021少妇久久久久久久久久久| 亚洲激情五月婷婷啪啪| 18禁动态无遮挡网站| 国产精品一及| 久久久欧美国产精品| 成人午夜高清在线视频| 黄色日韩在线| 国产亚洲精品久久久com| 久久久亚洲精品成人影院| 成年免费大片在线观看| 国内揄拍国产精品人妻在线| 天堂网av新在线| 免费看美女性在线毛片视频| 夫妻性生交免费视频一级片| 午夜精品在线福利| 只有这里有精品99| 又爽又黄a免费视频| 有码 亚洲区| 亚洲在久久综合| 亚洲五月天丁香|