Archive

IJASM Latest News

Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Successfully Published

Volume 7,Issue 3,May - June, 2020


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Successfully Published

Volume 7,Issue 3,May - June, 2020


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Successfully Published

Volume 7,Issue 3,May - June, 2020


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Successfully Published

Volume 7,Issue 3,May - June, 2020


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Successfully Published

Volume 7,Issue 3,May - June, 2020


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Successfully Published

Volume 7,Issue 3,May - June, 2020


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Successfully Published

Volume 7,Issue 3,May - June, 2020


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org


Successfully Published

Volume 7,Issue 3,May - June, 2020


Submissions open

"Submissions Open For Volume 7,Issue 4,July - Aug., 2020"


Mail your paper at E-mail:

Mail your paper at E-mail: submit2ijasm@yahoo.in , submit@ijasm.org



Our Journals

  • IJECCE
    IJECCE
  • IJEIR
    IJEIR
  • IJAIR
    IJAIR
  • IJAIM
    IJAIM
  • IJISM
    IJISM
  • IJRAS
    IJRAS
  • IJIRES
    IJIRES
  • IJRIES
    IJRIES
  • IJASM
    IJASM

IDS Based on Clustering and Immunity Genetic Algorithm

  • Xuecheng Liu
K-means cluster algorithm has good convergence rate, it strongly depends on initialization, and it can also easily be trapped in a local optimum. Global optimum can be reached with Genetic Algorithm, but GA converges very slowly. Therefore this article proposed one kind new model of intrusion detection which based on the cluster analysis and the immunity genetic algorithm, and modify the immunity genetic algorithm, improves the algorithm in the overall situation search ability and the convergence rate, avoid the sensitive to the initialization value obviously, moreover through the experiment proved that this intrusion detection model surpasses the classics genetic algorithm and K-means cluster algorithm, and achieve the anticipated effect.
Select Volume / Issue:
Year:
2020
Type of Publication:
Article
Keywords:
Network Security; Intrusion Detection; Clustering Analysis; Immunity Algorithm; Genetic Algorithm
Journal:
IJASM
Volume:
7
Number:
1
Pages:
1-10
Month:
January
ISSN:
2394-2894
Hits: 495
Don't have an account yet? Register Now!

Sign in to your account