A Detector Generating Algorithm for Intrusion Detection Inspired by Artificial Immune System

نویسندگان

  • Walid Mohamed Alsharafi
  • Mohd Nizam Omar
چکیده

Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection. The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and nonself discrimination in intrusion detection system (IDS). In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection. Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. This leads to detecting the real-time intrusion with less false negative.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STLR: a novel danger theory based structural TLR algorithm

Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...

متن کامل

A New Approach on Intrusion Detection Based On Avidity Model Clonal Selection

To make an immune-inspired network intrusion detection system (IDS) effective, this paper proposes a new framework, which includes our avidity-model based clonal selection (AMCS) algorithm as core element. The AMCS algorithm uses an improved representation for antigens (corresponding to network access patterns) and detectors (corresponding to detection rules). In particular, a bio-inspired tech...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Analysis of Human Immune System Inspired Intrusion Detection System

Artificial Immune Systems (AIS) are algorithms inspired by the human immune system. The human immune system is a robust, decentralized, error tolerant and adaptive system. Such properties are highly desirable for the development of novel computer systems. Unlike some other bio-inspired techniques, such as genetic algorithms and neural networks, the field of AIS encompasses a spectrum of algorit...

متن کامل

Apoptosis Inspired Intrusion Detection System

Artificial Immune Systems (AIS), inspired by the human immune system, are algorithms and mechanisms which are self-adaptive and self-learning classifiers capable of recognizing and classifying by learning, long-term memory and association. Unlike other human system inspired techniques like genetic algorithms and neural networks, AIS includes a range of algorithms modeling on different immune me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015