A recognition model for network intrusion based on artificial immune system

被引:0
作者
Liu, Z [1 ]
Tan, L [1 ]
Zhou, MT [1 ]
机构
[1] Univ Elect Sci & Technol China, Coll Comp Sci & Engn, Chengdu 610054, Peoples R China
来源
WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2 | 2004年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among many kinds of IDSs(Intrusion Detection system),how to recognize and identify network intrusions is a base criterion to evaluate an IDS. Traditional IDS implements this by security rules matching. However, new network intrusions emerge in endlessly. Obviously this detecting way can't meet new situation's need and will be out of date in the near future. Aiming at this problem, This paper bring forward a new kind of recognition model of network intrusions which make use of immune antibody's self-organized learning ability and may accomplish the recognition for variation of network intrusions properly.
引用
收藏
页码:812 / 820
页数:9
相关论文
共 50 条
[31]   Hacker Intrusion Detection System based on Artificial Neural Network [J].
Huang, Jing ;
Chen, Hai Bin ;
Zhang, Jiang ;
Zhang, Han Bo .
INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 :2924-+
[32]   ANNIDS: Intrusion detection system based on artificial neural network [J].
Liu, YH ;
Tian, DX ;
Wang, AM .
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, :1337-1342
[33]   AINIDS - An immune-based network intrusion detection system [J].
Yan Qiao ;
Yu Jianping .
DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
[34]   An artificial immune based intrusion detection model for computer and telecommunication systems [J].
Boukerche, A ;
Jucá, KRL ;
Sobral, JB ;
Notare, MSMA .
PARALLEL COMPUTING, 2004, 30 (5-6) :629-646
[35]   Applying Artificial Immune System for Intrusion Detection [J].
Hooks, Daniel ;
Yuan, Xiaohong ;
Roy, Kaushik ;
Esterline, Albert ;
Hernandez, Joaquin .
2018 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2018), 2018, :287-292
[36]   Integrated artificial immune system for intrusion detection [J].
Chen, Yue-Bing ;
Feng, Chao ;
Zhang, Quan ;
Tang, Chao-Jing .
Tongxin Xuebao/Journal on Communications, 2012, 33 (02) :125-131
[37]   Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method [J].
Liu, Cai Ming ;
Zhang, Yan ;
Hu, Zhihui ;
Xie, Chunming .
CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (02) :2361-2389
[38]   Identity Recognition using an Artificial Intelligence based on Artificial Immune System [J].
da Silva, Jadiel Caparros ;
dos Anjos Lima, Fernando Parra ;
Plasencia Lotufo, Anna Diva ;
de Campos Pereira Batista, Jorge Manuel Moreira .
2015 ASIA-PACIFIC CONFERENCE ON COMPUTER-AIDED SYSTEM ENGINEERING - APCASE 2015, 2015, :158-162
[39]   Modeling and generation of detectors in artificial immune based network intrusion detection systems [J].
Shahein, HI ;
Ibrahim, MO .
ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, :238-244
[40]   Immune Recognition Method Based on Analogy Reasoning in Intrusion Detection System [J].
ZHANG Changyou CAO Yuanda YANG Minghua YU Jiong ZHU Dongfeng School of Computer Science and Technology Beijing Institute of Technology Beijing China Computer Science and Technology Department Shijiazhuang Railway Institute Shijiazhuang Hebei China College of Information Science and Engineering Xinjiang University Wulumuqi Xinjiang China .
Wuhan University Journal of Natural Sciences, 2006, (06) :1839-1843