Network Security Situation Prediction Using Artificial Immune System and Phase Space Reconstruction

Article Preview

Abstract:

To solve network security situation prediction problem, a novel Prediction approach for network security situation based on artificial Immune system and Phase Space Reconstruction (PIPSR) is proposed. In PIPSR, we use phase space reconstruction to analyze the time series of network security situation and to reconstruct proper time series phase space; then, we use immune evolution mechanism to construct corresponding prediction model for network security situation; and lastly we use this prediction model to forecast network security situation. The simulation results show that PIPSR can more exactly forecast the future network security situation than GAP and BPNNP.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3662-3666

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] T. Bass: Intrusion detection systems and multisensor data fusion: creating cyberspace situational awareness. Communications of the ACM, America Vol 43(2000), p.99.

DOI: 10.1145/332051.332079

Google Scholar

[2] T. Li: Computer Immunology. Publishing House of Electronics Industry, Beijing(2004).

Google Scholar

[3] Z.H. Gan, T.W.S. Chow and W.N. Chau: Clone selection programming and its application to symbolic regression. Expert Systems with Applications Vol. 36(2009), p.3996.

DOI: 10.1016/j.eswa.2008.02.030

Google Scholar

[4] G.G. Szpiro: Forecasting chaotic time series with genetic algorithms. Phys. Rev. E(1997), p.2557.

Google Scholar

[5] C.M. Lee and C.N. Ko: Time series prediction using RBF neural networks with a nonlinear time-varying evolution PSO algorithm. Neurocomputing Vol. 73(2009), p.449.

DOI: 10.1016/j.neucom.2009.07.005

Google Scholar

[6] F. Takens: Detecting strange attractors in turbulence. Lecture notes in Mathematics Vol. 898, p.361.

Google Scholar

[7] H.S. Kim1, R. Eykholt and J. D. Salas: Nonlinear dynamics, delay times, and embedding windows. Physica D Vol. 127(1999), p.48.

DOI: 10.1016/s0167-2789(98)00240-1

Google Scholar

[8] S.Q. Yu, et al: Introduction to Immunology. Higher Education Press, Beijing(2008).

Google Scholar

[9] W.M. Hu, W. Hu, S. Maybank: Adaboost-based algorithm for network intrusion detection. IEEE Transactions on Systems, Man, and Cybernetics- Part B: Cybernetics Vol38(2008), p.577.

DOI: 10.1109/tsmcb.2007.914695

Google Scholar

[10] T. Li: An immunity based network security risk estimation. Science in China Ser. F: Information Sciences Vol. 48(2005), p.557.

Google Scholar