Network Intrusion Detection System Based on Negative Selection Algorithm Reinforced by Danger Theory


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Nowadays information systems are increasingly connected to computer networks, such major openness raised many security problems; hence, implementing an effective method in intrusion detection has become of great importance. In this work, we will present a new method of intrusion detection system inspired by the human immune. In this method, we introduce the danger theory to improve the profitability of detection of negative selection algorithm.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


IDS; Human Immunology; Artificial Immunology, Negative Selection Algorithm, The Danger Theory; Breast- Cancer-Wisconsin; Network Security

Full Text:

PDF


References


Li He-Hua, Wu Chun-ling, Study of Network Access Control System Featuring Collaboratively Interacting Network Security Components, (2013) International Review on Computers and Software (IRECOS), 8 (2), pp. 527-532.

F. Sun, and S. Zhang, Immunity-inspired risk assessment approach for network security, Proc. of the 2009 International Conference on Web Information Systems and Mining (WISM'09), pp. 515-518, 2009.

S. Forrest, S. Hofmeyr, and A. Somayaji, Computer immunology, Communications of the ACM, vol. 40, pp. 88-96, October 1997.

M. Ben Nasr, S. Saoud, A. Cherif, Optimization of MLP Using Genetic Algorithms Applied to Arabic Speech Recognition, (2013) International Review on Computers and Software (IRECOS), 8 (2), pp. 653-659.

S. Nandhini, S. Palaniammal, Fuzzy Based Congestion Detection Technique for Queuing in IP Networks, (2013) International Review on Computers and Software (IRECOS), 8 (4) pp. 941-948.

KEPHART J. O. A, Biologically Inspired Immune System for Computers, MIT Press, 1994.

S.FORREST, A.S PERELSON, L. ALEN, R. CHERUKURI, Self NonSelf Discrimination in a Computer, IEEE Symposium on Research in Securaty and Privacy, 1994.

J. Timmis, Artificial Immune Systems: A novel data analysis technique inspired by the immune network theory , PhD Thesis, University of Wales, 2001.

J.Timmis. Hane A, Stibor T, Clark.Z, theretical advances in artificial immune systems, Journal of theoretical computer Science, 2008.

D. Dasgupta , Artificial Immune Systems and Their Application , Springer-Verglas,1999.

J. Timmis & L.N. De Castro, Artificial immune Systems: A New computational Intelligence Approach, Springer-Verglas, London, 2002.

Forrest .S & Perelson.A & Allen.L & Cherukuri. R, Self-Nonself Discrimination in a computer, Proc. Of the IEEE Symposium on research in Security and Privacy, pp. 2002-212,1994.

Dasgupta.D, Advances in antificial immune systems. Digital Virsion 40 IEEE computational intelligence magazine. 1556-603X Nov 2006.

P. Matzinger, Tolerance, danger and the extended family, Annual Reviews in Immunology, vol. 12, pp. 991–1045, 1994

P. Matzinger, The danger model: a renewed sense of self, Science Mag, vol. 12, pp. 301-305, 2002.

U Aickelin and S Cayzer, The danger theory and its application to artificial immune systems.In J Timmis and P J Bentley, editors, Proceedings of the 1st International Conference on Artifcial Immune Systems (ICARIS), volume 1, pages 141.148,2002. University of Kent at Canterbury,September.

Feixian Sun, Artificial Immune Danger Theory Based Model for Network Security Evaluation, JOURNAL OF NETWORKS, VOL. 6, NO. 2, pp 255- 262, FEBRUARY 2011.

http://archive.ics.uci.edu/ml/machine-learning-databases/breast-cancer-wisconsin/.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize