Applying the danger model to design an intrusion detection system

被引:0
作者
Fu, Haidong [1 ]
Yuan, Xiguo [1 ]
Zhang, Kui [1 ]
Wang, Na [1 ]
Xia, Ting [1 ]
机构
[1] Wuhan Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Peoples R China
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3 | 2008年
关键词
DENDRITIC CELLS; ANOMALY DETECTION; ALGORITHM; TOLERANCE; SENSE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For many years, the classic self-nonself (SNS) discrimination models have served security experts to build intrusion detection systems (IDSs). However, the recently accumulative evidences have shown that not only can not the SNS models explain a number of documented phenomena, such as transplantation, tumor and autoimmunity in the context of immunology, but also they aren't able to overcome the scaling problems when in face of tremendous network traffic in terms of computer security. In this paper, a novel artificial immune system inspired by danger theory (DT) is proposed for the purposes of detecting intrusion. We have made the best use of the antigen presenting cells (APCs) to analyze endogenous signals, and harnessed the pattern recognition receptors (PRRs) for the recognition of exogenous signals. Based on the two types of signals, we establish a dynamic detection algorithm to gear to the complex network environment, improving the false positive and false negative.
引用
收藏
页码:1027 / +
页数:2
相关论文
共 22 条
[1]  
Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
[2]  
Aickelin U., 2002, 1 INT C AIS, P141
[3]  
Burnet SFM., 1959, The clonal selection theory of acquired immunity, DOI [10.5962/bhl.title.8281, DOI 10.5962/BHL.TITLE.8281]
[4]  
CHEN Q, P INT C DAT MIN DMIN, P232
[5]  
Dain O., 2001, P 2001 ACM WORKSHOP, P1
[6]  
Debar H., 2001, INT WORKSH REC ADV I, P85, DOI 10.1007/3-540-45474-86
[7]  
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
[8]  
Greensmith J, 2005, LECT NOTES COMPUT SC, V3627, P153
[9]  
Greensmith J, 2004, 6 INT C AD COMP DES
[10]  
GREENSMITH J, LECT NOTES COMPUTER, V4163, P404