A Model of Detector Generation Based on Immune Recognition and Redundancy Optimization

Article Preview

Abstract:

The theory of modern immunology provides a novel idea to study network intrusion detection and defense system. With the concepts of self, nonself, close degree and membership in an intrusion detection and prevention system presented in this paper, a model of detector generation based on immune recognition and redundancy optimization is proposed, in which detectors are generated by clone selection, genetic variation and evolutionary algorithm, as well as the improved redundancy optimization algorithm. The simulation experiments show that the model has higher detection rate and lower false detection rate.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

783-787

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Hazelburst, A. Attar, R. Sinnappan. 2000. Algorithms for improving the dependability of firewall and filter rule lists. Proceedings international conference: 576-585.

DOI: 10.1109/icdsn.2000.857593

Google Scholar

[2] E. Jonsson, T. Olovsson. 1997. A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Engineering, 23(4): 235 - 245.

DOI: 10.1109/32.588541

Google Scholar

[3] D. Dasgupta, S. Yua, F. Nino. 2011. Recent advances in artificial immune systems: models and applications. Applied Soft Computing, 11: 1574-1578.

DOI: 10.1016/j.asoc.2010.08.024

Google Scholar

[4] F. M. Burnet, 1959. The clone selection theory of acquired immunity. Gambridge, Gambridge University Press.

Google Scholar

[5] S. Forrest, A. S. Pearson. 1994. Self-nonself discrimination in a computer. IEEE Symposium in Security and Privacy: 202-213.

Google Scholar

[6] P. D' haeseleer, S. Forrest, P. Helman. 1996. An immunological approach to change detection: algorithms, analysis and implications. Proceedings of IEEE Symposium on Security and Privacy: 110-119.

DOI: 10.1109/secpri.1996.502674

Google Scholar

[7] Z. Ji, D . Dasgupta. 2004. Real-valued negative selection algorithm with variable-sized detectors. Proceedings of GECCO: 287-298.

DOI: 10.1007/978-3-540-24854-5_30

Google Scholar

[8] L. F. Chen. 2011. An improved negative selection approach for anomaly detection: with applications in medical diagnosis and quality inspect. Neural Computing & Applications, 20: 1-10.

Google Scholar

[9] W. Chen, T. Li. 2011. A new cluster based real negative selection algorithm. Communications in Computer and Information Science, 86: 125-131.

Google Scholar

[10] T. Li. 2009. The model of computer virus dynamic detection based on immune. Science in China, 39(4): 422-430.

Google Scholar