Applying Artificial Immune System for Intrusion Detection

被引:12
作者
Hooks, Daniel [1 ]
Yuan, Xiaohong [2 ]
Roy, Kaushik [2 ]
Esterline, Albert [2 ]
Hernandez, Joaquin [2 ]
机构
[1] Univ North Carolina Greensboro, Dept Comp Sci, Greensboro, NC 27412 USA
[2] North Carolina Agr & Tech State Univ, Dept Comp Sci, Greensboro, NC USA
来源
2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018) | 2018年
关键词
Human Immune System (HIS); Artificial Immune Systems (AIS); Intrusion Detection Systems (IDS); Negative Selection Algorithm (NSA); Clonal Selection Algorithm (CSA);
D O I
10.1109/BigDataService.2018.00051
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the approaches of using an analogy of the Human Immune System (HIS) to create an Artificial Immune System (AIS) based Intrusion Detection System (IDS). The two most popular AIS generating algorithms, Negative and Clonal Selection were explored and tested on the NSL-KDD dataset with different sets of features and different numbers of detectors. The experiments show that the Negative Selection Algorithm (NSA) and the Clonal Selection Algorithm (CSA) show a severe scaling issue when handling real network traffic.
引用
收藏
页码:287 / 292
页数:6
相关论文
共 23 条
[1]  
[Anonymous], 2002, P 1 INT C ART IMM SY
[2]  
[Anonymous], 1996, Proceedings of 1996 IEEE Symposium on Security and Privacy, DOI DOI 10.1109/SECPRI.1996.502675
[3]   A framework for evolving multi-shaped detectors in negative selection [J].
Balachandran, Sankalp ;
Dasgupta, Dipankar ;
Nino, Fernando ;
Garrett, Deon .
2007 IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTATIONAL INTELLIGENCE, VOLS 1 AND 2, 2007, :401-+
[4]  
De Castro L.N., 1999, TECH REP, V210, P210
[5]  
de Castro LeandroN., 2002, ARTIFICIAL IMMUNE SY
[6]   An evolutionary immune network for data clustering [J].
de Castro, LN ;
Von Zuben, FJ .
SIXTH BRAZILIAN SYMPOSIUM ON NEURAL NETWORKS, VOL 1, PROCEEDINGS, 2000, :84-89
[7]   An immunological approach to change detection: Theoretical results [J].
Dhaeseleer, P .
9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, :18-26
[8]  
ELKAN C, 2007, RESULTS KDD 99 KNOWL
[9]  
Farid D. M., 2009, INT C COMP SYST ENG
[10]  
Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580