Mimicry Detection Method Based on Immune Danger Theory

被引:0
|
作者
Tan, Min-sheng [1 ]
Cai, Chang [1 ]
Zhou, Huan [1 ]
Ding, Lin [1 ]
机构
[1] Univ South China, Sch Comp, Changsheng West Rd, Hengyang 421001, Hunan, Peoples R China
来源
14TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM 2018) | 2018年 / 306卷
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Considering that the traditional detector has lower detection rate, resource utilization and higher false alarm rate, this paper proposes a mimicry algorithm and a mimicry detector based on Immune Danger Theory (IDTMD). The detector adjusts the types and number of detection organizations and detection cells dynamically, according to the types and number of the detected signal and the detected dangerous signal, as to realize the dynamic, diversity and randomness of mimicry detection. The KDD-CUP99 dataset was used to test the comprehensive detection performance of the IDTMD detector, the detector based on Negative Selection Algorithm (NSA), the detector based on Dendritic Cell Algorithm (DAC). The results show that the detector improves the detection rate and the resource utilization, decreases the false alarm rate, and when testing amount reaches a certain scale, its response time is significantly less than other detectors'.
引用
收藏
页码:521 / 530
页数:10
相关论文
共 50 条
  • [41] Network fault detection using immune Danger Model
    Tian Yu-ling
    Lihui
    PROCEEDINGS OF THE 2012 24TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2012, : 1293 - 1296
  • [42] Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques
    Salmon, Helio
    de Farias, Claudio
    Loureiro, Paula
    Pirmez, Luci
    Rossetto, Silvana
    Rodrigues, Paulo
    Pirmez, Rodrigo
    Delicato, Flavia
    da Costa Carmo, Luiz
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2013, 20 (01) : 39 - 66
  • [43] Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory
    Ou, Chung-Ming
    Ou, C. R.
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2009, 5559 : 11 - +
  • [44] A Review on Immune-Inspired Node Fault Detection in Wireless Sensor Networks with a Focus on the Danger Theory
    Widhalm, Dominik
    Goeschka, Karl M.
    Kastner, Wolfgang
    SENSORS, 2023, 23 (03)
  • [45] Detection of immune danger signals by NALP3
    Martinon, Fabio
    JOURNAL OF LEUKOCYTE BIOLOGY, 2008, 83 (03) : 507 - 511
  • [46] Quality Control Model for Complex Manufacturing System Based on Danger Theory of Biological Immune System
    Zhang, Genbao
    Zeng, Haifeng
    Wang, Guoqiang
    Huang, Gengbao
    2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL III, 2009, : 265 - +
  • [47] Design of a dendritic cells inspired model based on danger theory for intrusion detection system
    Li, Xue
    Fu, Haidong
    Huang, Siliang
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1137 - +
  • [48] Danger Theory based Node Replication Attacks Detection in Mobile Wireless Sensor Network
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, A.
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [49] Danger Theory and Intrusion Detection: Possibilities and Limitations of the Analogy
    Vella, Mark
    Roper, Marc
    Terzis, Sotirios
    ARTIFICIAL IMMUNE SYSTEMS, 2010, 6209 : 276 - 289
  • [50] A network fault isolation method based on immune theory
    Zhu, Chen, 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (06):