Browse > Article

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks  

Yoo, Kyung-Min (전북대학교 컴퓨터공학과)
Yang, Won-Hyuk (전북대학교 컴퓨터공학과)
Kim, Young-Chon (전북대학교 IT정보공학부 영상정보신기술연구소)
Abstract
In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.
Keywords
AIS; Attack Detection; Immune System; WDM;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Yu and J. Graham, "Threat Evaluation for Intrusion Detection based upon Fuzzy Number Theory," Proc. of the Symposium on Information Assurance: Intrusion Detection and Prevention, pp.81-87, June 2006.
2 S. J. Chen and S. M. Chen, "A new simple center-of-gravity method for handling the fuzzy ranking and the defuzzification problems," Proc. of the 8th National Conference Fuzzy Theory Application, pp.103-110, 2000.
3 Dasgupta D., "Advances in Artificial Immune System," IEEE Computational Intelligence Magazine, Vol.1, pp.40-49, Nov. 2006.   DOI
4 M. S. Abadeh, J. Habibi, M. Daneshi, M. Jalali and M. Khezrzadeh, "Intrusion Detection using a Hybridization of Evolutionary Fuzzy Systems and Artificial immune Systems," Proc. of CEC 2007, pp.3547-3553, Sept. 2007.
5 Li Zhi-tang, Li Yao and Wang Li, "A Novel Fuzzy Anomaly Detection Algorithm based on Artificial Immune System," Proc. of HPCASIA '05, pp.5-9, Nov. 2005.
6 H. Groux, N. Fournier, and F. Cottrez, "Role of Dendritic cells in the generation of regulatory T cells", Seminars in Immunology, Vol.16, No.2, pp.99-106, 2004.   DOI   ScienceOn
7 Aickelin. U and Cayzer. S, "The Danger Theory and Its Application to Artificial Immune Systems," Proc. of ICAARIS2002, pp.141-148, 2002.
8 Zhen Yu Zhou, JianJing Shen, and XinPeng Zhang, "A Danger Theory Inspired Multi-agent Fusion Model for Network Security Assessment," Proc. of the ICC2007, Vol.3, pp.599-603, Aug. 2007.
9 S. Forrest, A. perelson, L. Allen, and R. Cherukuri, "Self-nonself discrimination in a computer," Proc. of the IEEE Symposium on Research in Security and Privacy, pp.202-212, 1994.