Mimicry Detection Method Based on Immune Danger Theory

被引:0
|
作者
Tan, Min-sheng [1 ]
Cai, Chang [1 ]
Zhou, Huan [1 ]
Ding, Lin [1 ]
机构
[1] Univ South China, Sch Comp, Changsheng West Rd, Hengyang 421001, Hunan, Peoples R China
来源
14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018) | 2018年 / 306卷
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Considering that the traditional detector has lower detection rate, resource utilization and higher false alarm rate, this paper proposes a mimicry algorithm and a mimicry detector based on Immune Danger Theory (IDTMD). The detector adjusts the types and number of detection organizations and detection cells dynamically, according to the types and number of the detected signal and the detected dangerous signal, as to realize the dynamic, diversity and randomness of mimicry detection. The KDD-CUP99 dataset was used to test the comprehensive detection performance of the IDTMD detector, the detector based on Negative Selection Algorithm (NSA), the detector based on Dendritic Cell Algorithm (DAC). The results show that the detector improves the detection rate and the resource utilization, decreases the false alarm rate, and when testing amount reaches a certain scale, its response time is significantly less than other detectors'.
引用
收藏
页码:521 / 530
页数:10
相关论文
共 50 条
  • [1] Rockbolts Detection Based on Immune Danger Theory
    Sun, Xiaoyun
    Zhao, Yang
    Zhang, Tianyuan
    Liu, Donghui
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 713 - 717
  • [2] Research of network intrusion detection based on immune danger theory
    School of Computer, Sichuan University, Chengdu 610064, China
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban), 2006, 5 (80-85):
  • [3] Research on AMU Fault Detection Algorithm Based on Immune Danger Theory
    Zhou Dexin
    Fan Zhicheng
    Zhang Wenlin
    2011 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, 2011, : 1957 - 1961
  • [4] Dynamic Anomaly Intrusion Detection Scheme Based on Immune Danger Theory
    Sun, Feixian
    Gao, Liping
    2010 ETP/IITA CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (SSSE 2010), 2010, : 62 - 64
  • [5] Danger Theory of Immune Systems and Intrusion Detection Systems
    Hong, Lu
    Yang, Jing
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL MECHATRONICS AND AUTOMATION, 2009, : 208 - +
  • [6] A Novel Artificial Immune Algorithm Based on Danger Theory
    Lu, Hong
    Wei, Wei
    PROCEEDINGS OF THE 2012 24TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2012, : 3748 - 3750
  • [7] Outbreak detection model based on danger theory
    Mohsin, Mohamad Farhan Mohamad
    Abu Bakar, Azuraliza
    Hamdan, Abdul Razak
    APPLIED SOFT COMPUTING, 2014, 24 : 612 - 622
  • [8] NETWORK PROACTIVE DEFENSE MODEL BASED ON IMMUNE DANGER THEORY
    Wang, Yu
    Wang, Zhenxing
    Zhang, Liancheng
    Kong, Yazhou
    COMPUTING AND INFORMATICS, 2015, 34 (05) : 1089 - 1112
  • [9] A Danger-Theory-Based Immune Network Optimization Algorithm
    Zhang, Ruirui
    Li, Tao
    Xiao, Xin
    Shi, Yuanquan
    SCIENTIFIC WORLD JOURNAL, 2013,
  • [10] Intelligent detector and related algorithms based on immune danger theory
    Tan, Minsheng
    Bai, Yaohua
    Zhou, Huan
    Liu, Jianxue
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43 (05): : 17 - 22