A Network Intrusion Detection Model Based on Artificial Immune

Article Preview

Abstract:

For the existing artificial immune systems applied to network intrusion detection have some shortages, an improved network intrusion detection model based on the dynamic clone selection algorithm which was put forward by Kim is proposed. The model introduces the concept of self group, which is obtained by the clustering algorithm AiNet and represents common features of normal data. The self group deals with network data before they are tested by detectors. In addition, the model adopts a design of distributed network intrusion detection, and a central server manages all the immune cells, receives vaccines and vaccinats the whole network detection hosts. Experimental results show that the number of selves and detectors are reduced, the process of affinity maturation for the detector population is speeded up, and the model achieves higher detection rate and lower false positive rate with the evolution generation increases.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 361-363)

Pages:

687-690

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] J.Kim, P.J. Bentley: M Evolution Computation CEC. (02. May 2002: 101521020)

Google Scholar

[2] J.Kim, P.J. Bentley: 7th European Conference on Intelligent Techniques and Soft Computing. (Aachen, Germany, 1999). Vol. 1, pp.13-19

Google Scholar

[3] T.Li: Chinese Journal of Computers. Vol.29(2006) No.9, pp.1515-1522, (in Chinese)

Google Scholar

[4] Kdd99. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.htm (1999)

Google Scholar

[5] L.N.De Castro, F.J. Von Zuben: Proc. of IEEE SBRN. Vol.17( 2)(2000), pp.84-89

Google Scholar

[6] L.N.De Castro, F.J. Von Zuben: Data Mining : A Heuristic Approach (Idea Group Publishing, USA 2001), pp.231-259.

Google Scholar

[7] J.Kim, P.J. Bentley: Journal of Genetic Programming and Evolvable Machines. Vol.5(4)(2004), pp.361-3911

Google Scholar