Abstract | ||
---|---|---|
To make an immune-inspired network intrusion detection system (IDS) effective, this paper proposes a new framework, which includes our avidity-model based clonal selection (AMCS) algorithm as core element. The AMCS algorithm uses an improved representation for antigens (corresponding to network access patterns) and detectors (corresponding to detection rules). In particular, a bio-inspired technique called gene expression programming (GEP) is integrated with artificial immune system (AIS) in detector representation. In addition, inspired by the avidity model of immunology, this paper also defines new avidity/affinity functions (corresponding to the metric for quantify the interactions between detector and antigens) that take the priorities of attribute into account. Accordingly, the proposed algorithm integrates both negative selection and positive selection with a balance factor k to assign appropriate weights to self and non-self avidity. The well known KDD CUP'99 DATA set is used for performance evaluation. The results show that the intrusion detection based on AMCS provides a higher detection rate of DoS attack, a lower false alarm rate, and a lower detectors generation cost. Our results indicate that breaking the bottleneck of immune-inspired network IDS through adjusting basic elements is feasible and effective. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/IWQoS.2010.5542731 | IWQoS |
Keywords | Field | DocType |
amcs algorithm,antigens,false alarm rate,detector representation,immune-inspired network ids,ais,network intrusion detection,core element,dos attack,avidity model,network access patterns,computer network security,immunology,avidity-model based clonal selection algorithm,bio-inspired technique,immune-inspired network intrusion detection system,lower detectors generation cost,genetic algorithms,clonal selection,performance evaluation,artificial immune systems,artificial immune system,gep,gene expression programming,quality of service,negative selection,gene expression,intrusion detection,artificial neural networks,computer science,immune system,classification algorithms,positive selection,detectors | Gene expression programming,Data mining,Computer science,Real-time computing,Artificial intelligence,Artificial neural network,Intrusion detection system,Genetic algorithm,Artificial immune system,Network security,Constant false alarm rate,Clonal selection algorithm,Machine learning | Conference |
Volume | Issue | ISSN |
null | null | 1548-615X |
ISBN | Citations | PageRank |
978-1-4244-5987-2 | 1 | 0.37 |
References | Authors | |
11 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Wan Tang | 1 | 13 | 3.07 |
Xi-Min Yang | 2 | 6 | 1.92 |
Xia Xie | 3 | 2 | 1.41 |
Li-Mei Peng | 4 | 117 | 23.37 |
Chan-hyun Youn | 5 | 238 | 42.68 |
Yang Cao | 6 | 1 | 0.37 |