Paper Title:
Intrusion Detection Based on Self-Organizing Map and Artificial Immunisation Algorithm
  Abstract

The rate of false positives which caused by the variability of environment and user behavior limits the applications of intrusion detecting system in real world. Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer security in recent years. To solve the intrusion detection question, we introduce the self-organizing map and artificial immunisation algorithm into intrusion detection. In this paper, we give an method of rule extraction based on self-organizing map and artificial immunisation algorithm and used in intrusion detection. After illustrating our model with a representative dataset and applying it to the real-world datasets MIT lpr system calls. The experimental result shown that We propose an idea of learning different representations for system call arguments. Results indicate that this information can be effectively used for detecting more attacks with reasonable space and time overhead. So our experiment is feasible and effective that using in intrusion detection.

  Info
Periodical
Key Engineering Materials (Volumes 439-440)
Edited by
Yanwen Wu
Pages
29-34
DOI
10.4028/www.scientific.net/KEM.439-440.29
Citation
Z. G. Chen, G. H. Zhang, L. Q. Tian, Z. L. Geng, "Intrusion Detection Based on Self-Organizing Map and Artificial Immunisation Algorithm", Key Engineering Materials, Vols. 439-440, pp. 29-34, 2010
Online since
June 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jie Yu, Guo Xiang Yao, Wei Wei Zhang
Abstract:As the surging development of the information technology, Intrusion Detection System has been devised for the safety of computer network....
1751
Authors: Chi Xu, Jin Chen
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:This paper describes in Using Self-Organizing Map (SOM) neural networks and its auto-clustering ability to study intrusion detection. The...
1479
Authors: Shu Hua Ma, Jin Kuan Wang, Zhi Gang Liu, Hou Yan Jiang
Chapter 1: Applied Mechanics and Measurement Technology of Detection and Monitoring
Abstract:Data measured and collected by WSNs is often unreliable and a big amount of anomaly data exist. Detecting these anomaly in energy-constrained...
226
Authors: Bo Chen, Yu Le Deng, Tie Ming Chen
Chapter 10: Applied Computing and Information Technologies
Abstract:The aim of dimensionality reduction is to construct a low-dimensional representation of high dimensional input data in such a way, that...
2412
Authors: Suppatoomsin Chompoo, Srikaew Arthit
Chapter 6: Techniques of Measuring and Modeling
Abstract:This paper presents a hybrid method for vehicle detection from CCTV captured image. In order to overwhelm such complex details of the color...
412