Immunity-based technique to detect network intrusions

被引:0
|
作者
Pan F. [1 ]
Ding Y.-F. [2 ]
Wang W.-N. [1 ]
机构
[1] Dept. of Comp. Sci. and Eng., Shanghai Jiaotong Univ.
[2] Dept. of Automat. Control, Univ. of Sheffield
来源
Journal of Zhejiang University-SCIENCE A | 2005年 / 6卷 / 5期
关键词
Artificial immune system; Clonal selection; Negative selection; Network intrusion detection;
D O I
10.1631/jzus.2005.A0371
中图分类号
学科分类号
摘要
This paper briefly reviews other people's works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest's negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.
引用
收藏
页码:371 / 377
页数:6
相关论文
共 50 条
  • [1] An immunity-based technique to detect network intrusions
    潘峰
    丁云飞
    汪为农
    Journal of Zhejiang University Science A(Science in Engineering), 2005, (05) : 371 - 377
  • [2] An immunity-based technique to characterize intrusions in computer networks
    Dasgupta, D
    González, F
    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) : 281 - 291
  • [3] Mechanism for generating immunity-based agents that detect masqueraders
    Okamoto, T
    Watanabe, T
    Ishida, Y
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2004, 3214 : 534 - 540
  • [4] A model of immunity-based network intrusion detection
    Sun, ZX
    Mao, ZX
    Gong, J
    Xu, HX
    Wang, RC
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 417 - 420
  • [5] An immunity-based model for network intrusion detection
    Zhang, YC
    Que, XR
    Wang, WD
    Cheng, SD
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E24 - E29
  • [6] An Efficient Autoencoder-based Deep Learning Technique to Detect Network Intrusions
    Haripriya, C.
    Jagadeesh, M. P. Prabhudev
    INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2022, 13 (07):
  • [7] A new immunity-based model for network intrusion detection
    Li, RF
    Wang, C
    Tu, XY
    2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 106 - 109
  • [8] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 123 - 130
  • [9] Artificial Immunity-based Anomaly Detection of Network User Behavior
    Zhang, Yan
    Liu, Caiming
    Qin, Hongying
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 644 - 648
  • [10] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2011, 15 (04) : 215 - 225