Research Article

An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection

Table 3

The computing steps of negative selection and clone selection.

Step 1Define a set (self) with equal-length strings. A single string generated randomly is divided into equal-sized substrings to generate .
Step 2Obtain a set that does not match the elements in .
Step 3Generate random situation in those strings with high weight. And starting from the situation, taking out equal length , the strings obtained will be duplicated.
Step 4A random bite is chosen in these cloned string. The bite will be the mutation. Thus, an initial antibody population is obtained.
Step 5Monitor by the detectors in . If any of the detectors matches a string in , then a normal attack is detected.