Hybrid Model based on Artificial Immune System and PCA Neural Networks for Intrusion Detection

被引:1
作者
Zhou, Yu-Ping [1 ]
机构
[1] Zhangzhou Normal Univ, Dept Comp Sci & Engn, Zhangzhou, Fujian, Peoples R China
来源
2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 1, PROCEEDINGS | 2009年
关键词
Intrusion detection; Soft computing; Genetic fuzzy; artificial immune;
D O I
10.1109/APCIP.2009.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDS) are developing very rapid in recent years. But most traditional IDS can only detect either misuse or anomaly attacks. In this paper, we propose a method combining artificial immune technique and Principal Components Analysis (PCA) neural networks to construct an intrusion detection model capable of both anomaly detection and misuse detection. Initially an artificial immune system detects anomalous network connections. In order to attain more detailed information about an intrusion, PCA is applied for classification and neural networks are used for online computing. The experiments and evaluations of the proposed method were performed with the KDD Cup 99 intrusion detection dataset, which have information on computer network, during normal behaviour and intrusive behaviour. Results indicate the high detection accuracy for intrusion attacks and low false alarm rate of the reliable system.
引用
收藏
页码:21 / 24
页数:4
相关论文
共 9 条
[1]  
[Anonymous], 1998, NEURAL NETWORKS COMP
[2]  
Diamantaras K. I., 1996, PRINCIPAL COMPONENT
[3]  
DOZIER G, 2007, APPL SOFT COMPUT, V7, P553
[4]   Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers [J].
Dozier, Gerry ;
Brown, Douglas ;
Hou, Haiyu ;
Hurley, John .
APPLIED SOFT COMPUTING, 2007, 7 (02) :547-553
[5]  
GONZALEZ F, 2002, P GEN EV COMP C GECC
[6]   Dimension reduction using feature extraction methods for real-time misuse detection systems [J].
Kuchimanchi, GK ;
Phoha, VV ;
Balagani, KS ;
Gaddam, SR .
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, :195-202
[7]  
Lee W. L. W., 1999, P 1999 IEEE S SEC PR
[8]  
Liu GS, 2006, LECT NOTES COMPUT SC, V3973, P240
[9]  
ZHU J, 2002, THESIS AUBUM U