Browse > Article
http://dx.doi.org/10.5391/JKIIS.2002.12.5.411

Intrusion Detection System of Network Based on Biological Immune System  

Sim, Kwee-Bo (중앙대학교 전자전기공학부)
Yang, Jae-Won (중앙대학교 전자전기공학부)
Lee, Dong-Wook (중앙대학교 전자전기공학부)
Seo, Dong-Il (한국전자통신연구원 사이버테러기술 분석팀)
Choi, Yang-Seo (한국전자통신연구원 사이버테러기술 분석팀)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.12, no.5, 2002 , pp. 411-416 More about this Journal
Abstract
Recently, the trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online internet, so it is expected to make a problem more and more. Currently, the general security system based on Internet couldn't cope with the attack properly, if ever, other regular systems have depended on common softwares to cope with the attack. In this paper, we propose the positive selection mechanism and negative selection mechanism of T-cell, which is the biological distributed autonomous system, to develop the self/non-self recognition algorithm, the anomalous behavior detection algorithm, and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. The proposed algorithm can cope with new intrusion as well as existing one to intrusion detection system in the network environment.
Keywords
BIS; positive selection; negative selection; intrusion detection;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 C. Warrender, S. Forrest, B. pearmutter, "Detecting intrusions using system calls: Alternative data models," IEEE Symposium on security and Privac, 1999.
2 Computer Emergency Response Team, "TCP SYN Flooding and IP Spoofing Attacks," CERT Advisory: CA, pp. 96-21, 1996.
3 W. Stevens, TCP/IP Illustrated, vol. 1, Addison Wesley Publishing, Company, 1994.
4 J. B. Gu, D. W. Lee, K. B. Sim, and S. H. Park, "An Immunity-based Security Layer against Internet Antigens," Transactions on IEICE, vol. E83-B, no.11, pp. 2570-2575, 2000.
5 S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequence of System Calls." Journal of Computer Security, vol. 6, pp.151-180, 1998.
6 A. Somayaji, S. Hofmeyr, and S. Forrest, "Principles of a Computer Immune System," New Security Paradigms Workshop, pp. 75-82, 1998.
7 D. Dasgupta, and S. Forrest, " An Anomaly Detection Algorithm Inspired by the Immune Systems and Their Applications," Springer, pp. 262-276, 1999.
8 P.D' haeseleer, S, Forrest, and P. Helman. "An immunological approach to change detection: Algorithms, analysis and implication," Proceeding of the 1996 IEEE Symposium on Research in Security and Privacy, Los Alami. 1996.