Acta Metallurgica Sinica(English letters) ›› 2014, Vol. 21 ›› Issue (2): 83-90.doi: 10.1016/S1005-8885(14)60290-9
• Others • Previous Articles Next Articles
Received:
Revised:
Online:
Published:
Contact:
Supported by:
the National Natural Science Foundation of China (61161140320).
Abstract:
The author puts forward an integrated intrusion detection (ID) model based on artificial immune (IIDAI), a vaccination strategy based on the significance degree of genes and a method to generate initial memory antibodies with rough set (RS). IIDAI integrates two kinds of intrusion detection mode: misuse detection and anonymous detection. Misuse detection and anonymous detection are applied to detect the known and the unknown attacks, respectively. On the basis of IIDAI model, an ID algorithm is presented. Simulation shows that the IIDAI has better performance than traditional ID methods in feasibility and effectiveness. It is very prone to achieve a higher convergence rate by using the vaccination strategy. Moreover, RS can remove the redundancy attributes and increase the detection speed. It can also increase detection rate by applying the integrated method.
Key words:
ID, RS, artificial immune, vaccination
CLC Number:
TP319.4
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: https://jcupt.bupt.edu.cn/EN/10.1016/S1005-8885(14)60290-9
https://jcupt.bupt.edu.cn/EN/Y2014/V21/I2/83
1. Shingo M, Chen C, Lu N N, et al. An intrusion-detection model based on fuzzy class-association-rule mining using genetic programming network. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2011, 41(1): 130-139
2. Li L, Zhao K N. A new intrusion detection system based on rough set theory and fuzzy support vector machine. Proceedings of the 3rd International Workshop on Intelligent Systems and Applications (ISA’11), May 28-29, 2011, Wuhan, China. Piscataway, NJ, USA: IEEE, 2011: 5p
3. Afaneh S, Zitar R A, Al-Hamami A. Virus detection using clonal selection algorithm with genetic algorithm (VDC algorithm). Applied Soft Computing, 2013, 13(1): 239-246
4. Denning D E. An intrusion detection model. IEEE Transactions on Software Engineering, 1987, 13 (2): 222-232
5. Hofmeye S A, Forrest S. Architecture for an artificial immune system. Evolutionary Computation, 2000, 8(4): 443-473
6. Kim J, Bentley P J. Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. Proceedings of the 2002 Congress on Evolutionary Computation (CEC’02): Vol 2, May 12-17, 2002, Honolulu, HI, USA. Piscataway, NJ, USA: IEEE, 2002: 1015-1020
7. Li T. Dynamic detection for computer virus based on immune system. Science in China Series F: Information Sciences, 2008, 51(10): 1475-1486
8. Yan X H. An artificial immune-based intrusion detection model using vaccination strategy. Acta Electronica Sinica, 2009, 37(4): 780-785 (in Chinese)
9. Chen Y B, Feng C, Zhang Q, et al. Integrated artificial immune system for intrusion detection. Journal on Communications, 2012, 33(2): 125-131 (in Chinese)
10. Sperotto A, Mandjes M, Sadre R, et al. Autonomic parameter tuning of anomaly-based IDSs: an SSH case study. IEEE Transactions on Network and Service Management, 2012, 9(2): 128-141
11. Pawlak Z, Gzymala-Busse J, Slowinski R, et al. Rough sets. Communications of the ACM, 1995, 38(11): 88-95
12. Qian J, Miao D Q, Zhang Z H. Knowledge reduction algorithms in cloud computing. Chinese Journal of Computers, 2011, 34(12): 2332-2343 (in Chinese)
13. Zhang L, Bai Z Y, Luo S S, et al. Integrated intrusion detection model based on rough set and artificial immune. Journey on Communications, 2013, 34(9): 166-176 (in Chinese)