[1]李柏杭,王新安,雍珊珊,等.人工免疫算法在 AETA 异常检测中的应用研究[J].计算机技术与发展,2019,29(03):1-5.[doi:10.3969/ j. issn.1673-629X.2019.03.001]
 LI Bo-hang,WANG Xin-an,YONG Shan-shan,et al.Research on Application of Artificial Immune Algorithm in Discriminating Abnormal Data of AETA Equipment[J].,2019,29(03):1-5.[doi:10.3969/ j. issn.1673-629X.2019.03.001]
点击复制

人工免疫算法在 AETA 异常检测中的应用研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
29
期数:
2019年03期
页码:
1-5
栏目:
智能、算法、系统工程
出版日期:
2019-03-10

文章信息/Info

Title:
Research on Application of Artificial Immune Algorithm in Discriminating Abnormal Data of AETA Equipment
文章编号:
1673-629X(2019)03-0001-05
作者:
李柏杭王新安雍珊珊徐伯星黄继攀
北京大学 深圳地震监测预测技术研究中心,广东 深圳 518055
Author(s):
LI Bo-hangWANG Xin-anYONG Shan-shanXU Bo-xingHUANG Ji-pan
Shenzhen Earthquake Monitoring and Prediction Technology Research Center,Peking University, Shenzhen 518055,China
关键词:
人工免疫算法异常检测地震数据分析数据挖掘
Keywords:
AISabnormal detectionearthquake data analysisdata mining
分类号:
TP39
DOI:
10.3969/ j. issn.1673-629X.2019.03.001
摘要:
AETA 多分量地震监测系统已经在中国四川、云南、河北、广东、西藏、台湾等地区布设 200 余套。 一套 AETA 设备每个月产生 7 G 数据,查看 200 套设备的数据需要花费大量的时间和精力,而且人工判断异常容易漏检。 利用人工免疫算法中负向选择的思想,通过对正常数据的学习获得相应的抗体库,根据待测数据与抗体库中抗体的匹配程度对设备数据进行异常检测。 另外,结合 AETA 设备数据特点,改进了人工免疫算法中的亲和力函数,减少了计算量。 首先,从 AETA 设备中选取了 8 个典型台站的低频电磁数据的正常数据进行训练,得到抗体库,然后对待测数据进行异常检测。 利用该方法,可以有效检测出系统中常见的 3 种异常数据,3 种异常的检测成功率分别为 87. 20%、83. 33%、55. 56%。 可以实现异常数据的初步判定。
Abstract:
AETA multi-component seismic monitoring system has been deployed in more than 200 sets in Sichuan,Yunnan,Hebei, Guangdong,Tibet and Taiwan. A set of AETA equipment generates 7G of data every month,and it takes a lot of time and effort to view the data of 200 sets of equipment,and it is easy to miss detection by manual judgment. Using the idea of negative selection in the artificial immune algorithm,the corresponding antibody library is obtained by learning the normal data. According to the matching degree between the data to be tested and the antibodies in the antibody library,the abnormal detection of equipment data is carried out. In addition, combined with the data characteristics of AETA equipment,the affinity function in the artificial immune algorithm is improved to reduce the amount of calculation. First,the normal data of low-frequency electromagnetic data of 8 typical stations are selected from the AETA equipment for training to obtain the antibody library,and then anomaly detection is performed on the measured data. By this method,it is possible to effectively detect three types of abnormal data in the system. The detection accuracy of the three abnormalities are 87.20%, 83. 33% and 55. 56% respectively. A preliminary determination of abnormal data can be achieved.

相似文献/References:

[1]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(03):148.
[2]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(03):168.
[3]汪慧敏.基于改进负选择算法的异常检测[J].计算机技术与发展,2009,(08):41.
 WANG Hui-min.Anomaly Detection Using Modified Negative Selection Algorithm[J].,2009,(03):41.
[4]赵辉 张鹏.网络异常的主动检测与特征分析[J].计算机技术与发展,2009,(08):159.
 ZHAO Hui,ZHANG Peng.Active Detection and Feature Analysis About Network Anomaly[J].,2009,(03):159.
[5]陈丹伟 黄秀丽 任勋益.基于人工神经网络入侵检测模型的探讨[J].计算机技术与发展,2009,(12):143.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.An Approach to IDS Model Based on Artificial Neuron Network[J].,2009,(03):143.
[6]柏海滨 李俊.基于支持向量机的入侵检测系统的研究[J].计算机技术与发展,2008,(04):137.
 BAI Hai-bin,LI Jun.Research of Intrusion Detection System Based on Support Vector Machine[J].,2008,(03):137.
[7]宋连涛 庄卫华.基于异常的入侵检测技术在Snort系统中的应用[J].计算机技术与发展,2006,(06):136.
 SONG Lian-tao,ZHUANG Wei-hua.Application of Anomaly Detection Technology in Snort System[J].,2006,(03):136.
[8]王大将 王敏.软计算融合技术研究[J].计算机技术与发展,2012,(04):97.
 WANG Da-jiang,WANG Min.Research on Fusion Technology of Soft Computing[J].,2012,(03):97.
[9]陈平 宋玉蓉 蒋国平.基于多维聚类挖掘的异常检测方法研究[J].计算机技术与发展,2012,(07):136.
 CHEN Ping,SONG Yu-rong,JIANG Guo-ping.Multidimensional Clustering Based Anomaly Detection Research[J].,2012,(03):136.
[10]崔锡鑫,苏伟,刘颖.基于熵的流量分析和异常检测技术研究与实现[J].计算机技术与发展,2013,(05):120.
 CUI Xi-xin,SU Wei,LIU Ying.Research and Implementation of Traffic Analysis and Anomaly Detection Technology Based on Entropy[J].,2013,(03):120.

更新日期/Last Update: 2019-03-10