Full Text:   <2861>

CLC number: TP393.08

On-line Access: 

Received: 2003-12-05

Revision Accepted: 2004-04-21

Crosschecked: 0000-00-00

Cited: 119

Clicked: 6062

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE A 2005 Vol.6 No.5 P.371-377

http://doi.org/10.1631/jzus.2005.A0371


An immunity-based technique to detect network intrusions


Author(s):  PAN Feng, DING Yun-fei, WANG Wei-nong

Affiliation(s):  Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, China; more

Corresponding email(s):   fpan@sjtu.edu.cn, pan_feng_hao@hotmail.com

Key Words:  Artificial immune system, Network intrusion detection, Negative selection, Clonal selection


PAN Feng, DING Yun-fei, WANG Wei-nong. An immunity-based technique to detect network intrusions[J]. Journal of Zhejiang University Science A, 2005, 6(5): 371-377.

@article{title="An immunity-based technique to detect network intrusions",
author="PAN Feng, DING Yun-fei, WANG Wei-nong",
journal="Journal of Zhejiang University Science A",
volume="6",
number="5",
pages="371-377",
year="2005",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.2005.A0371"
}

%0 Journal Article
%T An immunity-based technique to detect network intrusions
%A PAN Feng
%A DING Yun-fei
%A WANG Wei-nong
%J Journal of Zhejiang University SCIENCE A
%V 6
%N 5
%P 371-377
%@ 1673-565X
%D 2005
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2005.A0371

TY - JOUR
T1 - An immunity-based technique to detect network intrusions
A1 - PAN Feng
A1 - DING Yun-fei
A1 - WANG Wei-nong
J0 - Journal of Zhejiang University Science A
VL - 6
IS - 5
SP - 371
EP - 377
%@ 1673-565X
Y1 - 2005
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2005.A0371


Abstract: 
This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest’s negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1] DARPA, 1999. Intrusion Detection Evaluation. http://www.ll.mit.edu/IST/ideval/index.html.

[2] Dasgupta, D., Gonzalez, F., 2002. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans on Evolutionary Computation, 6(3):281-291.

[3] de Castro, L.N., Von Zuben, F.J., 1999. Artificial Immune Systems: Part I–Basic Theory and Applications. Technical Report–RT DCA 01/99, FEEC/Univ. Campinas, Campinas, Brazil. http://www.dca.fee.unicamp.br/~lnunes/immune.html.

[4] Denning, D., 1987. An intrusion-detection model. IEEE Trans. Software Eng., 13:222-232.

[5] D’haeseleer, P., Forrest, S., Helman, P., 1996. An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.

[6] Forrest, S., Perelson, A., Allen, L., Cherukuri, R., 1994. Self-Nonself Discrimination in A Computer. Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, p.202-212.

[7] Forrest, S., Hofmeyr, S.A., Somayaji, A., 1996. A Sense of self for UNIX Processes. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.

[8] Forrest, S., Hofmeyr, S., Somayaji, A., 1997. Computer immunology. Communications of the ACM, 40(10):88-96.

[9] Harmer, P.K., Williams, P.O., Gunsch, G.H., Lamont, G.B., 2002. An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation, 6(3):252-280.

[10] Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjee, B., Wood, J., Wolber, D., 1990. A Network Security Monitor. Proceedings of the IEEE Symposium on Security and Privacy, IEEE Press.

[11] Hofmeyr, S.A., 1999. An Immunological Model of Distributed Detection and Its Application to Computer Security. Ph. D. Dissertation, University of New Mexico.

[12] Hunt, J.E., Cooke, D.E., 1996. Learning using an artificial immune system. Journal of Network and Computer Applications, p.189-212.

[13] Kim, J., Bentley, P.J., 2001. Evaluating Negative Selection in An Artificial Immune System for Network Intrusion Detection. Genetic and Evolutionary Computation Conference 2001 (GECCO-2001), San Francisco, p.1330-1337.

[14] Perelson, A.S., Weisbuch, G., 1997. Immunology for Physicists. Rev. of Modern Physics, 69(4):1219-1265.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE