An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System

Authors

  • Pallvi Dehariya Department of Information Technology, TIT (RGPV), Bhopal, India

Keywords:

Intrusion Detection System, Artificial Immune System, Clustering

Abstract

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organized and distributed manner. The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still need to be designed for IT systems. The proposed intrusion detection system will use the concepts of the artificial immune systems (AIS) which is a promising biologically inspired computing model. AIS concepts that can be applied to improve the effectiveness of IDS.

 

References

Cho, Sung-Bae..Artificial Life Technology for Adaptive Information Processing. Chapter 2 in Future Directions for Intelligent Systems and Information Sciences: The Future of Speech and Image Technologies, Brain Computers, WWW, and Bioinformatics, edited by Nikola Kasabov, Volume 45 of Studies in Fuzziness and Soft Computing, 13.33. Heidelberg, Germany: Physica-Verlag. 2003. ISBN 3-7908-1276-5.

Dasgupta, Dipankar., October. .Immunity-Based Intrusion Detection System: A General Framework.. Proceedings of the 22nd National Information Systems Security Conference (NISSC). 1999 National Institute of Standards and Technology and National Computer Security Center, Hyatt Regency.Crystal City, Virginia, United States.

Dasgupta, Dipankar, Yuehua Cao, and Congjun Yang..An Immunogenetic Approach to Spectra Recognition.. Edited by Wolfgang Banzhaf, Jason Daida, Agoston E. Eiben, Max H. Garzon, Vasant Honavar, Mark Jakiela, and Robert E. Smith, Proceedings of the Genetic and Evolutionary Computation (GECCO) Conference, Volume 1. Orlando, Florida, United States: Morgan Kaufmann, 149.155. 2003, July 13.17. ISBN 1-55860-611-4.

Dasgupta, Dipankar, and Stephanie Forrest. .Novelty Detection in TimeSeries Data using Ideas from Immunology.. Proceedings of the 5th International Conference on Intelligent Systems. 1996, June 19.21.Reno, Nevada, United States.

Nong Ye and Xiangyang Li. A scalable clustering technique for intrusion signature recognition. In Proc. 2nd IEEE SMC Information Assurance Workshop, pages 1-4, 2001.

Yu Guan, Ali A. Ghorbani, and Nabil Belacel. Y-means: a clustering method for intrusion detection. In Canadian Conference on Electrical and Computer Engineering, pages 1-4, Montral, Qubec, Canada, May 2003.

Teuvo Kohonen. Self-Organizing Map. Springer-Verlag, New York, 1997

M.Shivakumar, R.Subalakshmi, S. Shanthakumari and S.John Joseph, "Architecture for Network-Intrusion Detection and Response in open Networks using Analyzer Mobile Agents", International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-04, Page No (1-7), Sep -Oct 2013

K.Santhi and V.Abinaya, "Intrusion Detection System for Black Hole Detection and Prevention in MANET Using Adaptive Neural Fuzzy Inference Systems", International Journal of Computer Sciences and Engineering, Volume-03, Issue-12, Page No (82-88), Dec -2015

Kohonen, T. 1995. Self-Organizing Maps, volume 30 of Springer Series in Information Sciences. Berlin, Heidelberg: Springer. (Second Extended Edition 1997).

Leonid Portnoy, “Intrusion Detection with Unlabeled Data using Clustering', Undergraduate Thesis, Columbia University, New York, NY, Dec. 2000.

Lane, T., and Brodley, C. E.. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security 2(3): 295—331, 1999.

Sukhandeep Kaur and Kanwalvir Singh Dhindsa, "Neural Network Based Speaker Verification using GFCC", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (63-65), Nov -2015

“NIST Special Publication on Intrusion Detection Systems“, SP 800-31 Computer Security Resource Center (CSRC), National Institute of Standards and Technology (NIST), Nov. 2001, p.15.

P.Lichodzijewski, A. n. Zincir-Heywood Weiming Hu and M. I. Heywood, “Host-based intrusion detection using Neural Gas,” Proceedings of the 2002 IEEE World Congress on Computational Intelligence, 2002 (in press).

Salvatore J. Stolfo, Wei Fan, Hu Zhengbing1, Wenke Lee, "Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project", Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2000.

Vesanto J., Alhoniemi E. Stefano Zanero, “Clustering of the Neural Gas Map,” IEEE Transactions on Neural Networks, 11(3), pp 586-600, 2000

Wenke Lee, Sal Stolfo, and Kui Mok. Mining in a data environment: Experience in network intrusion detection. In Proc. 5thACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, pages 114{124, San Diego, CA, August 1999.

Downloads

Published

2016-02-29

How to Cite

[1]
P. Dehariya, “An Artificial Immune System and Neural Network to Improve the Detection Rate in Intrusion Detection System”, Int. J. Sci. Res. Net. Sec. Comm., vol. 4, no. 1, pp. 1–4, Feb. 2016.

Issue

Section

Research Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.