Mimicry Detection Method Based on Immune Danger Theory

被引:0
|
作者
Tan, Min-sheng [1 ]
Cai, Chang [1 ]
Zhou, Huan [1 ]
Ding, Lin [1 ]
机构
[1] Univ South China, Sch Comp, Changsheng West Rd, Hengyang 421001, Hunan, Peoples R China
来源
14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018) | 2018年 / 306卷
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Considering that the traditional detector has lower detection rate, resource utilization and higher false alarm rate, this paper proposes a mimicry algorithm and a mimicry detector based on Immune Danger Theory (IDTMD). The detector adjusts the types and number of detection organizations and detection cells dynamically, according to the types and number of the detected signal and the detected dangerous signal, as to realize the dynamic, diversity and randomness of mimicry detection. The KDD-CUP99 dataset was used to test the comprehensive detection performance of the IDTMD detector, the detector based on Negative Selection Algorithm (NSA), the detector based on Dendritic Cell Algorithm (DAC). The results show that the detector improves the detection rate and the resource utilization, decreases the false alarm rate, and when testing amount reaches a certain scale, its response time is significantly less than other detectors'.
引用
收藏
页码:521 / 530
页数:10
相关论文
共 50 条
  • [21] An Anomaly Detection Model Based on Cloud Model and Danger Theory
    Wang, Wenhao
    Zhang, Chen
    Zhang, Quan
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 115 - 122
  • [22] Design of an artificial immune system based on Danger Model for fault detection
    Laurentys, C. A.
    Palhares, R. M.
    Caminhas, W. M.
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (07) : 5145 - 5152
  • [23] Design of an Immune-inspired Danger Theory Model Based on Fuzzy Set
    Fu Hai-Dong
    Li Gui-Feng
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, 2008, : 133 - 136
  • [24] Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness
    Sun, Feixian
    Wu, Zhigang
    ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 66 - +
  • [25] Design of a four-layer IDS Model Based on Immune Danger Theory
    Yuan, Song
    Chen, Qi-juan
    Li, Peng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4502 - +
  • [26] The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 204 - 211
  • [27] Demonstrating Danger Theory Based Threat Detection for Robotic Manufacture Protection
    Degeler, Viktoriya
    French, Richard
    Jones, Kevin
    2015 SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), 2015, : 283 - 284
  • [28] An Intrusion Detection Model Based on Danger Theory for Wireless Sensor Networks
    Li, Linlin
    Sun, Liangxu
    Wang, Gang
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (09) : 53 - 65
  • [29] The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model
    Zhang Ruirui
    Li Tao
    Xiao Xin
    Shi Yuanquan
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 475 - 478
  • [30] Intelligent Fraudulent Detection System Based SVM And Optimized By Danger Theory
    Rajak, Isha
    Mathai, K. James
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,