Novel immune system model and its application to network intrusion detection

被引:0
|
作者
Ling, Jun [1 ]
Cao, Yang [1 ,2 ]
Yin, Jian-Hua [1 ]
Huang, Tian-Xi [1 ]
机构
[1] Sch. of Electron. Info., Wuhan Univ., Wuhan 430072, China
[2] Lab. of Software Eng., Wuhan Univ., Wuhan 430072, China
关键词
Algorithms - Mathematical models - Security of data;
D O I
10.1007/bf02907218
中图分类号
学科分类号
摘要
Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model.
引用
收藏
页码:393 / 398
相关论文
共 50 条
  • [2] Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
    Huang, Xuepeng
    Lin, Jianhui
    Proceedings of the 2016 International Conference on Engineering and Technology Innovations, 2016, 43 : 42 - 47
  • [3] Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
    Wang Linjing
    Zhang Han
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 230 - 235
  • [4] Immune Mobile Agent and Its Application in Intrusion Detection System
    Li, Yongzhong
    Jing, Chunwei
    Xu, Jing
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 42 - 45
  • [5] Network Intrusion Detection System Model Based On Artificial Immune
    Zhang Yanbin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 359 - 369
  • [6] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [7] Network Intrusion Detection by Artificial Immune System
    Shen, Junyuan
    Wang, Jidong
    IECON 2011: 37TH ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2011,
  • [8] The Application Of Immune Clone Algorithm In Network Intrusion Detection
    Zhang, Xuekun
    An, Jing
    Wang, Yongbin
    Liu, Wen
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 619 - 622
  • [9] A Novel Hybrid Model for Network Intrusion Detection
    Tiwari, Shobhit
    Roy, Sanjiban Sekhar
    Charaborty, Saptarshi
    Kumar, Anugrah
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 685 - 688
  • [10] Network Intrusion Detection through Artificial Immune System
    Tabatabaefar, Marzie
    Miriestahbanati, Maryam
    Gregoire, Jean-Charles
    2017 11TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2017, : 334 - 339