Browse > Article

An Adaptive Anomaly Detection Model Design based on Artificial Immune System in Central Network  

Yoo, Kyoung-Min (전북대학교 컴퓨터공학과 차세대통신망 연구실)
Yang, Won-Hyuk (전북대학교 컴퓨터공학과 차세대통신망 연구실)
Lee, Sang-Yeol (전북대학교 컴퓨터공학과 차세대통신망 연구실)
Jeong, Hye-Ryun (전북대학교 컴퓨터공학과 차세대통신망 연구실)
So, Won-Ho (순천대학교 컴퓨터교육과)
Kim, Young-Chon (전북대학교 영상정보신기술연구소)
Abstract
The traditional network anomaly detection systems execute the threshold-based detection without considering dynamic network environments, which causes false positive and limits an effective resource utilization. To overcome the drawbacks, we present the adaptive network anomaly detection model based on artificial immune system (AIS) in centralized network. AIS is inspired from human immune system that has learning, adaptation and memory. In our proposed model, the interaction between dendritic cell and T-cell of human immune system is adopted. We design the main components, such as central node and router node, and define functions of them. The central node analyzes the anomaly information received from the related router nodes, decides response policy and sends the policy to corresponding nodes. The router node consists of detector module and responder module. The detector module perceives the anomaly depending on learning data and the responder module settles the anomaly according to the policy received from central node. Finally we evaluate the possibility of the proposed detection model through simulation.
Keywords
central network; anomaly detection; artificial immune system;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 F. Gonzalez, 'A Study of Artificial Immune Systems Applied to Anomaly Detection,' Dissertation for Ph. D degree, 2003
2 김영선, 'BcN의 기술적 이슈와 전망,' 한국정보통신기술협회, 2005
3 J. Kim, W. O. Wilson, U. Aickelin, and J. McLeod, 'Cooperative Automated Worm Response and Detection ImmuNe Algorithm (CARDINAL) Inspired by T-Cell Immunity and Tolerance,' LNCS 3627, pp. 168-181, 2005
4 Fabricio Sergio de Paulo and Paulo Licio de Geus, 'Attack Evidence Detection, Recovery, and Signature Extraction with ADENOIDS,' ICT 2004, LNCS 3124, pp. 1083-1092, 2004
5 M. S. Abadeh, J. Habibi, M. Daneshi, M. Jalali and M. Khezrzadeh, 'Intrusion Detection using a Hybridization of Evolutionary Fuzzy Systems and Artificial Immune Systems,' In the Proceeding of CEC 2007, pp. 3547-3553, Sept. 2007
6 K. Luther, R. Bye, T. Alpcan, A. Muller and S. Albayrak, 'A Cooperative AIS Framework for Intrusion Detection,' In Proceeding of ICC '07, pp.1409-1416, June 2007
7 하기룡, 이도헌, '인공면역체계와 기계학습,' 정보과학회지, 제25권 제 3호, pp. 76-82, 2007   과학기술학회마을