Immunity-based technique to detect network intrusions

被引:0
|
作者
Pan F. [1 ]
Ding Y.-F. [2 ]
Wang W.-N. [1 ]
机构
[1] Dept. of Comp. Sci. and Eng., Shanghai Jiaotong Univ.
[2] Dept. of Automat. Control, Univ. of Sheffield
来源
Journal of Zhejiang University-SCIENCE A | 2005年 / 6卷 / 5期
关键词
Artificial immune system; Clonal selection; Negative selection; Network intrusion detection;
D O I
10.1631/jzus.2005.A0371
中图分类号
学科分类号
摘要
This paper briefly reviews other people's works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest's negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.
引用
收藏
页码:371 / 377
页数:6
相关论文
共 50 条
  • [21] Controlling spam: Immunity-based approach
    Kawecki, Konrad
    Seredynski, Franciszek
    Pilski, Marek
    INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2006, : 31 - +
  • [22] Designing an immunity-based sensor network for sensor-based diagnosis of automobile engines
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 146 - 153
  • [23] Editorial: Trained Immunity-Based Vaccines
    Subiza, Jose Luis
    Palomares, Oscar
    Quinti, Isabella
    Sanchez-Ramon, Silvia
    FRONTIERS IN IMMUNOLOGY, 2021, 12
  • [24] A Dynamic Immunity-Based Real-time Network Risk Evaluation Method
    Zeng, Jie
    Zeng, Jinquan
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, : 3 - +
  • [25] A Novel Immunity-Based Anomaly Detection Method
    Zeng, Jie
    Zeng, Jinquan
    FBIE: 2008 INTERNATIONAL SEMINAR ON FUTURE BIOMEDICAL INFORMATION ENGINEERING, PROCEEDINGS, 2008, : 195 - +
  • [26] Towards an immunity-based system for detecting masqueraders
    Okamoto, T
    Watanabe, T
    Ishida, Y
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2003, 2774 : 488 - 495
  • [27] Immunity-based autonomous guided vehicles control
    Lau, Henry Y. K.
    Wong, Vicky W. K.
    Lee, Ivan S. K.
    APPLIED SOFT COMPUTING, 2007, 7 (01) : 41 - 57
  • [28] Towards an immunity-based system for detecting masqueraders
    Okamoto, Takeshi
    Ishida, Yoshiteru
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2009, 13 (3-4) : 103 - 110
  • [29] IMMUNITY-BASED DETECTION OF CYBERATTACKS ON MQTT BROKERS
    Okamoto, Takeshi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2024, 20 (02): : 617 - 634
  • [30] An Artificial Immunity-based Proactive Defense System
    Tan, Minsheng
    Yu, Hongxiao
    Zhao, Zhiguo
    Liu, Zhaohui
    Liu, Fangju
    2007 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS, VOLS 1-5, 2007, : 2239 - 2243