Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0108

An Intrusion Detection Method Based on Changes of Antibody Concentration in Immune Response  

Zhang, Ruirui (School of Business, Sichuan Agricultural University)
Xiao, Xin (School of Computer Science, Southwest Minzu University)
Publication Information
Journal of Information Processing Systems / v.15, no.1, 2019 , pp. 137-150 More about this Journal
Abstract
Although the research of immune-based anomaly detection technology has made some progress, there are still some defects which have not been solved, such as the loophole problem which leads to low detection rate and high false alarm rate, the exponential relationship between training cost of mature detectors and size of self-antigens. This paper proposed an intrusion detection method based on changes of antibody concentration in immune response to improve and solve existing problems of immune based anomaly detection technology. The method introduces blood relative and blood family to classify antibodies and antigens and simulate correlations between antibodies and antigens. Then, the method establishes dynamic evolution models of antigens and antibodies in intrusion detection. In addition, the method determines concentration changes of antibodies in the immune system drawing the experience of cloud model, and divides the risk levels to guide immune responses. Experimental results show that the method has better detection performance and adaptability than traditional methods.
Keywords
Antibody Concentration; Artificial Immune; Cloud Model; Evolutionary Algorithms; Intrusion Detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. N. de Castro and J. I. Timmis, "Artificial immune systems as a novel soft computing paradigm," Soft Computing, vol. 7, no. 8, pp. 526-544, 2003.   DOI
2 J. Shifflet, "A technique independent fusion model for network intrusion detection," in Proceedings of the Midstates Conference for Undergraduate Research in Computer Science and Mathematics, Wooster, OH, 2005, pp. 13-19.
3 S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," in Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA,1994, pp. 202-212.
4 S. Hofmeyr and S. Forrest, "Immunity by design: an artificial immune system," in Proceedings of the Genetic and Evolutionary Computation Conference, Orlando, FL, 1999, pp. 1289-1296.
5 S. Hofmeyr and S. Forrest, "Architecture for an artificial immune system," Evolutionary Computation, vol. 8, no. 4, pp. 443-473, 2000.   DOI
6 D. Dasgupta and S. Forrest, "Artificial immune systems in industrial applications," in Proceedings of the 2nd International Conference on Intelligent Processing and Manufacturing of Materials, Honolulu, HI, 1999, pp. 257-267.
7 J. Kim and P. J. Bentley, "Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection," in Proceedings of the Congress on Evolutionary Computation, Honolulu, HI, 2002, pp. 1015-1020.
8 J. Kim, P. J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross, "Immune system approaches to intrusion detection: a review," Natural Computing, vol. 6, no. 4, pp. 413-466, 2007.   DOI
9 P. D. Williams, K. P. Anchor, J. L. Bebo, G. H. Gunsch, and G. D. Lamont, "CDIS: towards a computer immune system for detecting network intrusions," in International Workshop on Recent Advances in Intrusion Detection. Heidelberg: Springer, 2001, pp. 117-133.
10 P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont, "An artificial immune system architecture for computer security applications," IEEE Transactions on Evolutionary Computation, vol. 6, no. 3, pp. 252-280, 2002.   DOI
11 U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod, "Danger theory: the link between AIS and IDS?," in International Conference on Artificial Immune Systems. Heidelberg: Springer, 2003, pp. 147-155.
12 J. Greensmith, U. Aickelin, and G. Tedesco, "Information fusion for anomaly detection with the dendritic cell algorithm," Information Fusion, vol. 11, no. 1, pp. 21-34, 2010.   DOI
13 D. Y. Li, C. Y. Liu, and L. Y. Liu, "Study on the universality of the normal cloud model," Engineering Science, vol. 6, no. 8, pp. 28-34, 2004.   DOI
14 D. Y. Li, H. J. Meng, and X. M. Shi, "Membership clouds and membership cloud generators," Computer Research and Development, vol. 32, no. 6, pp. 15-20, 1995.
15 S. Rathore, A. Saxena, and M. Manoria, "Intrusion detection system on KDDCup99 dataset: a survey," International Journal of Computer Science and Information Technologies, vol. 6, no. 4, pp. 3345-334, 2015.