Immune System Based Intrusion Detection System (IS-IDS): A Proposed

被引:30
作者
Dutt, Inadyuti [1 ]
Borah, Samarjeet [1 ]
Maitra, Indra Kanta [2 ]
机构
[1] Sikkim Manipal Univ, Sikkim Manipal Inst Technol, Dept Comp Applicat, Majhitar 737136, India
[2] St Xaviers Univ, Controller Examinat Dept, Kolkata 700160, India
关键词
Immune system; Intrusion detection; Pathogens; Adaptive systems; Telecommunication traffic; Anomaly detection; Payloads; Computer networks; computer security; intrusion detection; immune system; anomaly detection; network; T-cell; B-cell; innate immune system; adaptive immune system; FEATURES;
D O I
10.1109/ACCESS.2020.2973608
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores the immunological model and implements it in the domain of intrusion detection on computer networks. The main objective of the paper is to monitor, log the network traffic and apply detection algorithms for detecting intrusions within the network. The proposed model mimics the natural Immune System (IS) by considering both of its layers, innate immune system and adaptive immune system respectively. The current work proposes Statistical Modeling based Anomaly Detection (SMAD) as the first layer of Intrusion Detection System (IDS). It works as the Innate Immune System (IIS) interface and captures the initial traffic of a network to find out the first-hand vulnerability. The second layer, Adaptive Immune-based Anomaly Detection (AIAD) has been considered for determining the features of the suspicious network packets for detection of anomaly. It imitates the adaptive immune system by taking into consideration the activation of the T-cells and the B-cells. It captures relevant features from header and payload portions for effective detection of intrusion. Experiments have been conducted on both the real-time network traffic and the standard datasets KDD99 and UNSW-NB15 for intrusion detection. The SMAD model yields as high as 96.04%true positive rate and around 97% true positive rate using real-time traffic and standard data sets. Highly suspicious traffic detected in the SMAD model is further tested for vulnerability in the AIAD model. Results show significant true positive rate, closer to almost 99% of accurately detecting the file-based and user-based anomalies for both the real-time traffic and standard data sets.
引用
收藏
页码:34929 / 34941
页数:13
相关论文
共 31 条
[1]   A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization [J].
Ali, Mohammed Hasan ;
Al Mohammed, Bahaa Abbas Dawood ;
Ismail, Alyani ;
Zolkipli, Mohamad Fadli .
IEEE ACCESS, 2018, 6 :20255-20261
[2]  
Alsharafi W. M., 2015, ARPN J ENG APPL SCI, V10, P608
[3]  
[Anonymous], 1999, THESIS
[4]  
[Anonymous], 2002, P 2002 ACM S APPL CO
[5]  
[Anonymous], 2014, J INFORM PROCESSING
[6]  
[Anonymous], 2006, THESIS
[7]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[8]   The Multitasking Organ: Recent Insights into Skin Immune Function [J].
Di Meglio, Paola ;
Perera, Gayathri K. ;
Nestle, Frank O. .
IMMUNITY, 2011, 35 (06) :857-869
[9]  
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
[10]  
Gu F, 2012, BIOLOGICALLY INSPIRED NETWORKING AND SENSING: ALGORITHMS AND ARCHITECTURES, P84, DOI 10.4018/978-1-61350-092-7.ch005