Paper Title:
A Network Intrusion Detection Method Inspired by Biological Immunology
  Abstract

In this article an Immune Based Intrusion Detection Model (IBIDM) was built to simulate the dynamic relationships between the intrusion antigen intensity and the antibody concentration in the biological immune systems. In IBIDM, traditional detection rules and network traffic patterns are mapped to antibodies and antigens respectively. The network security situation is presented in the form of detector numbers to help reduce false alarm rate. Computer simulations show that the proposed model is effective for intrusion detection.

  Info
Periodical
Advanced Materials Research (Volumes 121-122)
Edited by
Donald C. Wunsch II, Honghua Tan, Dehuai Zeng, Qi Luo
Pages
482-485
DOI
10.4028/www.scientific.net/AMR.121-122.482
Citation
R. Deng, X. Y. Zhang, "A Network Intrusion Detection Method Inspired by Biological Immunology", Advanced Materials Research, Vols. 121-122, pp. 482-485, 2010
Online since
June 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jie Yu, Guo Xiang Yao, Wei Wei Zhang
Abstract:As the surging development of the information technology, Intrusion Detection System has been devised for the safety of computer network....
1751
Authors: Qiao Hu, Bao An Hao, Hong Yi, Yun Chuan Yang
Measure Control Technologies and Intelligent Systems
Abstract:Due to the high-speed, short-time countermeasure and small target strength of underwater high-speed small targets (UHSST), it is difficult to...
1282
Authors: Jie Liang, Jian Wei Sun
Abstract:Application layer vulnerabilities represent a substantial portion of the security exposures of computer networks. In this paper, we explore...
1253
Authors: Chi Xu, Jin Chen
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:This paper describes in Using Self-Organizing Map (SOM) neural networks and its auto-clustering ability to study intrusion detection. The...
1479
Authors: Yu Zhang, Feng Xia
Chapter 18: Computer Applications in Industry and Engineering
Abstract:Malware (malicious software) is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to...
2688