Paper Title:
A Network Intrusion Detection Model Based on Artificial Immune
  Abstract

For the existing artificial immune systems applied to network intrusion detection have some shortages, an improved network intrusion detection model based on the dynamic clone selection algorithm which was put forward by Kim is proposed. The model introduces the concept of self group, which is obtained by the clustering algorithm AiNet and represents common features of normal data. The self group deals with network data before they are tested by detectors. In addition, the model adopts a design of distributed network intrusion detection, and a central server manages all the immune cells, receives vaccines and vaccinats the whole network detection hosts. Experimental results show that the number of selves and detectors are reduced, the process of affinity maturation for the detector population is speeded up, and the model achieves higher detection rate and lower false positive rate with the evolution generation increases.

  Info
Periodical
Advanced Materials Research (Volumes 361-363)
Chapter
Chapter 7: Storage and Processing of Agricultural Products
Edited by
Qunjie Xu, Honghua Ge and Junxi Zhang
Pages
687-690
DOI
10.4028/www.scientific.net/AMR.361-363.687
Citation
X. Xiao, R. R. Zhang, "A Network Intrusion Detection Model Based on Artificial Immune", Advanced Materials Research, Vols. 361-363, pp. 687-690, 2012
Online since
October 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jie Yu, Guo Xiang Yao, Wei Wei Zhang
Abstract:As the surging development of the information technology, Intrusion Detection System has been devised for the safety of computer network....
1751
Authors: Jie Liang, Jian Wei Sun
Abstract:Application layer vulnerabilities represent a substantial portion of the security exposures of computer networks. In this paper, we explore...
1253
Authors: Chi Xu, Jin Chen
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:This paper describes in Using Self-Organizing Map (SOM) neural networks and its auto-clustering ability to study intrusion detection. The...
1479
Authors: Yu Zhang, Feng Xia
Chapter 18: Computer Applications in Industry and Engineering
Abstract:Malware (malicious software) is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to...
2688
Authors: Shu Hua Ma, Jin Kuan Wang, Zhi Gang Liu, Hou Yan Jiang
Chapter 1: Applied Mechanics and Measurement Technology of Detection and Monitoring
Abstract:Data measured and collected by WSNs is often unreliable and a big amount of anomaly data exist. Detecting these anomaly in energy-constrained...
226