The artificial immune algorithm used by the hardware immune system on the chip of the embedded processor directly determines the security performance of the processor, determines the degree to which the embedded system can resist attacks from unknown malware, and the intrusion detection system based on artificial immune theory can detect intrusion activity by analyzing the relevant data of the system security, detect the intrusion of known types and unknown types, and respond according to the needs, but most of these detection systems are based on the general-purpose processor, the computational volume is large, the operation efficiency is low, Poor applicability, low detection speed, poor real-time, so we must improve the traditional artificial immune algorithm, while improving the performance of the algorithm while taking into account the feasibility of the algorithm in hardware implementation.
正在翻译中..