Intrusion Detection Based on Self-Organizing Map and Artificial Immunisation Algorithm

被引:1
作者
Chen, Zhenguo [1 ]
Zhang, Guanghua [2 ,3 ]
Tian, Liqin [1 ]
Geng, Zilin [1 ]
机构
[1] North China Inst Sci & Technol, Dept Comp Sci & Technol, Beijing 101601, Peoples R China
[2] Hebei Univ Sci & Technol, Coll Informat Sci & Engn, Shijiazhuang 050054, Peoples R China
[3] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
来源
ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2 | 2010年 / 439-440卷
基金
中国国家自然科学基金;
关键词
intrusion detection; rule Extraction; artificial immunisation; network security;
D O I
10.4028/www.scientific.net/KEM.439-440.29
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rate of false positives which caused by the variability of environment and user behavior limits the applications of intrusion detecting system in real world. Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer security in recent years. To solve the intrusion detection question, we introduce the self-organizing map and artificial immunisation algorithm into intrusion detection. In this paper, we give an method of rule extraction based on self-organizing map and artificial immunisation algorithm and used in intrusion detection. After illustrating our model with a representative dataset and applying it to the real-world datasets MIT lpr system calls. The experimental result shown that We propose an idea of learning different representations for system call arguments. Results indicate that this information can be effectively used for detecting more attacks with reasonable space and time overhead. So our experiment is feasible and effective that using in intrusion detection.
引用
收藏
页码:29 / +
页数:3
相关论文
共 13 条
[1]  
[Anonymous], 1980, Computer Security Threat Monitoring and Surveillance
[2]  
Cohen W.W., 1995, P 12 INT C MACH LEAR, P115, DOI [10.1016/b978-1-55860-377-6.50023-2, DOI 10.1016/B978-1-55860-377-6.50023-2]
[3]  
Hu Y., 2004, SAC 04, P711, DOI DOI 10.1145/967900.968048
[4]  
KALLE B, 2007, INFORM SECURITY TECH, V12, P56
[5]  
Kohonen T., 2001, Self-Organizing Maps
[6]  
Kwok JTY, 1998, ICONIP'98: THE FIFTH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING JOINTLY WITH JNNS'98: THE 1998 ANNUAL CONFERENCE OF THE JAPANESE NEURAL NETWORK SOCIETY - PROCEEDINGS, VOLS 1-3, P347
[7]  
LEE W, 2000, P 3 INT WORKSH REC A, P49
[8]  
MacQueen J., 1967, P 5 BERK S MATH STAT, V1, P281, DOI DOI 10.1007/S11665-016-2173-6
[9]  
Oh SH, 2003, COMPUT SECUR, V22, P596, DOI 10.1016/S0167-4048(03)00710-7
[10]  
Portnoy L., 2001, Proc. ACM CSS Workshop on Data Mining Applied to Security (DMSA), P5