Dynamically real-time intrusion detection algorithm with immune network

被引:0
作者
Hu, Xinlei [1 ]
Liu, Xiaojie [1 ]
Li, Tao [1 ]
Yang, Tao [2 ]
Chen, Wen [1 ]
Liu, Zhengjun [1 ]
机构
[1] College of Computer Science, Sichuan University, Chengdu
[2] China West Normal University, Nanchong
来源
Journal of Computational Information Systems | 2015年 / 11卷 / 02期
关键词
Artificial immune; Immune network; Intrusion detection; Stimulation level;
D O I
10.12733/jcis13038
中图分类号
学科分类号
摘要
The deficiency of traditional immune-based intrusion model is that the definition of detector will not change after it has been defined, the static definition of detection profiles could not well adapt to the real complex network environment. This results in lower detection rate and higher false alarm rate. Dynamically real-time intrusion detection algorithm with immune network (DIDAIN) is proposed in this paper. We establish a quantitative description for the model, and adopt the immune network stimulation-suppression mechanism to real-time update mature detector set dynamically. The dynamic definition of detector could well adapt to the real complex network environment. Meanwhile, the stimulation of a mature detector in the immune network decides the probability of clone and mutation. The higher the stimulation level is, the greater the probability of clone and mutation makes excellent detector retained. Under KDD Cup99 dataset, comparing with the traditional immune-based intrusion models, the proposed algorithm DIDAIN could get the highest detection rate and the lowest false alarm rate. 1553-9105/Copyright © 2015 Binary Information Press
引用
收藏
页码:587 / 594
页数:7
相关论文
共 20 条
[1]  
Dozier G., Brown D., Hou H., Et al., Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers, Applied Soft Computing, 7, pp. 547-553, (2007)
[2]  
Dhaeseleer P., Forrest S., Helman P., An immunological approach to change detection: theoretical results, IEEE Computer Society, pp. 18-27, (1996)
[3]  
Forrest S., Perelson A.S., Allen L., Cherukuri R., SelfCnonself Discrimination in a Computer, pp. 202-212, (1994)
[4]  
Forrest S., Dasgupta D., Artificial Immune System in Industrial Applications A, Proc. of the IPMM, (1999)
[5]  
Hofmeyr S.A., Forrest S., Architecture for an artificial immune system, Evolutionary Computation, 7, 1, pp. 45-68, (2000)
[6]  
Dasgupta D., Gonzale F., An immunity-based technique to characterize intrusions in computer networks, Evolutionary Computation, 6, 3, pp. 281-291, (2002)
[7]  
Zeng J., Liu X., Li T., Et al., A self-adaptive negative selection algorithm used for anomaly detection, Natural Science, 19, pp. 261-266, (2009)
[8]  
Kim J., Bentley P.J., An evaluation of negative selection in an artificial immune system for network intrusion detection, Proceedings of GECCO, (2001)
[9]  
Kim J., Bentley P.J., Towards an artificial immune system for network intrusion detection: an investigation of dynamic colonel selection, Proceedings of the Congress on Evolutionary Computation (CEC-2002), pp. 1015-1020, (2002)
[10]  
Gong M., Zhang J., Ma J., Jiao L., An efficient negative selection algorithm with further training for anomaly detection, Knowledge-Based Systems, 30, pp. 185-191, (2012)