CLC number: TP393.08
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 0000-00-00
Cited: 119
Clicked: 6406
PAN Feng, DING Yun-fei, WANG Wei-nong. An immunity-based technique to detect network intrusions[J]. Journal of Zhejiang University Science A, 2005, 6(5): 371-377.
@article{title="An immunity-based technique to detect network intrusions",
author="PAN Feng, DING Yun-fei, WANG Wei-nong",
journal="Journal of Zhejiang University Science A",
volume="6",
number="5",
pages="371-377",
year="2005",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2005.A0371"
}
%0 Journal Article
%T An immunity-based technique to detect network intrusions
%A PAN Feng
%A DING Yun-fei
%A WANG Wei-nong
%J Journal of Zhejiang University SCIENCE A
%V 6
%N 5
%P 371-377
%@ 1673-565X
%D 2005
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2005.A0371
TY - JOUR
T1 - An immunity-based technique to detect network intrusions
A1 - PAN Feng
A1 - DING Yun-fei
A1 - WANG Wei-nong
J0 - Journal of Zhejiang University Science A
VL - 6
IS - 5
SP - 371
EP - 377
%@ 1673-565X
Y1 - 2005
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2005.A0371
Abstract: This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest’s negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.
[1] DARPA, 1999. Intrusion Detection Evaluation. http://www.ll.mit.edu/IST/ideval/index.html.
[2] Dasgupta, D., Gonzalez, F., 2002. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans on Evolutionary Computation, 6(3):281-291.
[3] de Castro, L.N., Von Zuben, F.J., 1999. Artificial Immune Systems: Part I–Basic Theory and Applications. Technical Report–RT DCA 01/99, FEEC/Univ. Campinas, Campinas, Brazil. http://www.dca.fee.unicamp.br/~lnunes/immune.html.
[4] Denning, D., 1987. An intrusion-detection model. IEEE Trans. Software Eng., 13:222-232.
[5] D’haeseleer, P., Forrest, S., Helman, P., 1996. An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.
[6] Forrest, S., Perelson, A., Allen, L., Cherukuri, R., 1994. Self-Nonself Discrimination in A Computer. Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, p.202-212.
[7] Forrest, S., Hofmeyr, S.A., Somayaji, A., 1996. A Sense of self for UNIX Processes. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.
[8] Forrest, S., Hofmeyr, S., Somayaji, A., 1997. Computer immunology. Communications of the ACM, 40(10):88-96.
[9] Harmer, P.K., Williams, P.O., Gunsch, G.H., Lamont, G.B., 2002. An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation, 6(3):252-280.
[10] Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjee, B., Wood, J., Wolber, D., 1990. A Network Security Monitor. Proceedings of the IEEE Symposium on Security and Privacy, IEEE Press.
[11] Hofmeyr, S.A., 1999. An Immunological Model of Distributed Detection and Its Application to Computer Security. Ph. D. Dissertation, University of New Mexico.
[12] Hunt, J.E., Cooke, D.E., 1996. Learning using an artificial immune system. Journal of Network and Computer Applications, p.189-212.
[13] Kim, J., Bentley, P.J., 2001. Evaluating Negative Selection in An Artificial Immune System for Network Intrusion Detection. Genetic and Evolutionary Computation Conference 2001 (GECCO-2001), San Francisco, p.1330-1337.
[14] Perelson, A.S., Weisbuch, G., 1997. Immunology for Physicists. Rev. of Modern Physics, 69(4):1219-1265.
Open peer comments: Debate/Discuss/Question/Opinion
<1>