Full Paper View Go Back

An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System

Pallvi Dehariya1

1 Department of Information Technology, TIT (RGPV), Bhopal, India.

Correspondence should be addressed to: pallavideh90@gmail.com.


Section:Research Paper, Product Type: Journal
Vol.4 , Issue.1 , pp.1-4, Feb-2016

Online published on Feb 28, 2016


Copyright © Pallvi Dehariya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Pallvi Dehariya, “An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System,” International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.1, pp.1-4, 2016.

MLA Style Citation: Pallvi Dehariya "An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System." International Journal of Scientific Research in Network Security and Communication 4.1 (2016): 1-4.

APA Style Citation: Pallvi Dehariya, (2016). An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System. International Journal of Scientific Research in Network Security and Communication, 4(1), 1-4.

BibTex Style Citation:
@article{Dehariya_2016,
author = {Pallvi Dehariya},
title = {An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {2 2016},
volume = {4},
Issue = {1},
month = {2},
year = {2016},
issn = {2347-2693},
pages = {1-4},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=229},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=229
TI - An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Pallvi Dehariya
PY - 2016
DA - 2016/02/28
PB - IJCSE, Indore, INDIA
SP - 1-4
IS - 1
VL - 4
SN - 2347-2693
ER -

2105 Views    1441 Downloads    1351 Downloads
  
  

Abstract :
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organized and distributed manner. The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still need to be designed for IT systems. The proposed intrusion detection system will use the concepts of the artificial immune systems (AIS) which is a promising biologically inspired computing model. AIS concepts that can be applied to improve the effectiveness of IDS.

Key-Words / Index Term :
Intrusion Detection System, Artificial Immune System, Clustering

References :
[1]. Cho, Sung-Bae..Artificial Life Technology for Adaptive Information Processing. Chapter 2 in Future Directions for Intelligent Systems and Information Sciences: The Future of Speech and Image Technologies, Brain Computers, WWW, and Bioinformatics, edited by Nikola Kasabov, Volume 45 of Studies in Fuzziness and Soft Computing, 13.33. Heidelberg, Germany: Physica-Verlag. 2003. ISBN 3-7908-1276-5.
[2]. Dasgupta, Dipankar., October. .Immunity-Based Intrusion Detection System: A General Framework.. Proceedings of the 22nd National Information Systems Security Conference (NISSC). 1999 National Institute of Standards and Technology and National Computer Security Center, Hyatt Regency.Crystal City, Virginia, United States.
[3]. Dasgupta, Dipankar, Yuehua Cao, and Congjun Yang..An Immunogenetic Approach to Spectra Recognition.. Edited by Wolfgang Banzhaf, Jason Daida, Agoston E. Eiben, Max H. Garzon, Vasant Honavar, Mark Jakiela, and Robert E. Smith, Proceedings of the Genetic and Evolutionary Computation (GECCO) Conference, Volume 1. Orlando, Florida, United States: Morgan Kaufmann, 149.155. 2003, July 13.17. ISBN 1-55860-611-4.
[4]. Dasgupta, Dipankar, and Stephanie Forrest. .Novelty Detection in TimeSeries Data using Ideas from Immunology.. Proceedings of the 5th International Conference on Intelligent Systems. 1996, June 19.21.Reno, Nevada, United States.
[5]. Nong Ye and Xiangyang Li. A scalable clustering technique for intrusion signature recognition. In Proc. 2nd IEEE SMC Information Assurance Workshop, pages 1-4, 2001.
[6]. Yu Guan, Ali A. Ghorbani, and Nabil Belacel. Y-means: a clustering method for intrusion detection. In Canadian Conference on Electrical and Computer Engineering, pages 1-4, Montral, Qubec, Canada, May 2003.
[7]. Teuvo Kohonen. Self-Organizing Map. Springer-Verlag, New York, 1997
[8]. M.Shivakumar, R.Subalakshmi, S. Shanthakumari and S.John Joseph, "Architecture for Network-Intrusion Detection and Response in open Networks using Analyzer Mobile Agents", International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-04, Page No (1-7), Sep -Oct 2013
[9]. K.Santhi and V.Abinaya, "Intrusion Detection System for Black Hole Detection and Prevention in MANET Using Adaptive Neural Fuzzy Inference Systems", International Journal of Computer Sciences and Engineering, Volume-03, Issue-12, Page No (82-88), Dec -2015
[10]. Kohonen, T. 1995. Self-Organizing Maps, volume 30 of Springer Series in Information Sciences. Berlin, Heidelberg: Springer. (Second Extended Edition 1997).
[11]. Leonid Portnoy, “Intrusion Detection with Unlabeled Data using Clustering', Undergraduate Thesis, Columbia University, New York, NY, Dec. 2000.
[12]. Lane, T., and Brodley, C. E.. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security 2(3): 295—331, 1999.
[13]. Sukhandeep Kaur and Kanwalvir Singh Dhindsa, "Neural Network Based Speaker Verification using GFCC", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (63-65), Nov -2015
[14]. “NIST Special Publication on Intrusion Detection Systems“, SP 800-31 Computer Security Resource Center (CSRC), National Institute of Standards and Technology (NIST), Nov. 2001, p.15.
[15]. P.Lichodzijewski, A. n. Zincir-Heywood Weiming Hu and M. I. Heywood, “Host-based intrusion detection using Neural Gas,” Proceedings of the 2002 IEEE World Congress on Computational Intelligence, 2002 (in press).
[16]. Salvatore J. Stolfo, Wei Fan, Hu Zhengbing1, Wenke Lee, "Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project", Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000.
[17]. Vesanto J., Alhoniemi E. Stefano Zanero, “Clustering of the Neural Gas Map,” IEEE Transactions on Neural Networks, 11(3), pp 586-600, 2000
[18]. Wenke Lee, Sal Stolfo, and Kui Mok. Mining in a data environment: Experience in network intrusion detection. In Proc. 5thACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, pages 114{124, San Diego, CA, August 1999.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation