An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection
Table 3
The computing steps of negative selection and clone selection.
Step 1
Define a set (self) with equal-length strings. A single string generated randomly is divided into equal-sized substrings to generate .
Step 2
Obtain a set that does not match the elements in .
Step 3
Generate random situation in those strings with high weight. And starting from the situation, taking out equal length , the strings obtained will be duplicated.
Step 4
A random bite is chosen in these cloned string. The bite will be the mutation. Thus, an initial antibody population is obtained.
Step 5
Monitor by the detectors in . If any of the detectors matches a string in , then a normal attack is detected.