Mimicry Detection Method Based on Immune Danger Theory

被引:0
|
作者
Tan, Min-sheng [1 ]
Cai, Chang [1 ]
Zhou, Huan [1 ]
Ding, Lin [1 ]
机构
[1] Univ South China, Sch Comp, Changsheng West Rd, Hengyang 421001, Hunan, Peoples R China
来源
14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018) | 2018年 / 306卷
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Considering that the traditional detector has lower detection rate, resource utilization and higher false alarm rate, this paper proposes a mimicry algorithm and a mimicry detector based on Immune Danger Theory (IDTMD). The detector adjusts the types and number of detection organizations and detection cells dynamically, according to the types and number of the detected signal and the detected dangerous signal, as to realize the dynamic, diversity and randomness of mimicry detection. The KDD-CUP99 dataset was used to test the comprehensive detection performance of the IDTMD detector, the detector based on Negative Selection Algorithm (NSA), the detector based on Dendritic Cell Algorithm (DAC). The results show that the detector improves the detection rate and the resource utilization, decreases the false alarm rate, and when testing amount reaches a certain scale, its response time is significantly less than other detectors'.
引用
收藏
页码:521 / 530
页数:10
相关论文
共 50 条
  • [31] Multi-agents artificial immune system (MAAIS) inspired by danger theory for anomaly detection
    Fu, Haidong
    Yuan, Xiguo
    Wang, Na
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 570 - 573
  • [32] Adaptive Danger Area Based Danger Model Immune Algorithm
    Xu, Qingyang
    Meng, Xianyao
    Wang, Ning
    Zhang, Chuang
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 109 - +
  • [33] BATESIAN MIMICRY AND SIGNAL-DETECTION THEORY
    OATEN, A
    PEARCE, CEM
    SMYTH, MEB
    BULLETIN OF MATHEMATICAL BIOLOGY, 1975, 37 (04) : 367 - 387
  • [34] An Intrusion Detection Technology based on Immune Theory
    Peng Yali
    Deng Jiangang
    Zou Chengwu
    Yu Min
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGS: IMAGE ANALYSIS, INFORMATION AND SIGNAL PROCESSING, 2009, : 148 - +
  • [35] An Immune Algorithm Based on Danger Model
    Zhang, Chenggong
    Liu, Guisong
    Hu, Wang
    2008 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2008, : 468 - 473
  • [36] Artificial Immune Systems, Danger Theory, and the Oracle Problem
    Roper, Marc
    2009 TESTING: ACADEMIC AND INDUSTRIAL CONFERENCE-PRACTICE AND RESEARCH TECHNIQUES, TAIC PART 2009, 2009, : 125 - 126
  • [37] Danger Theory Based Micro Immune Optimization Algorithm Solving Probabilistic Constrained Optimization
    Zhang, Zhuhong
    Li, Lun
    Zhang, Renchong
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017, : 103 - 107
  • [38] A Danger Model Based Anomaly Detection Method for Wireless Sensor Networks
    Zhang, Kui
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 1, 2009, : 11 - 14
  • [39] Research of DoS intrusion real-time detection based on danger theory
    Xu Chun
    Chen Xing-shu
    Zhao Hui
    Jiang Yu-ming
    Liu Nian
    Wang Tie-fang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 209 - 211
  • [40] SHADuDT: Secure hypervisor-based anomaly detection using danger theory
    Azmi, Reza
    Pishgoo, Boshra
    COMPUTERS & SECURITY, 2013, 39 : 268 - 288