Skip to main content

A Negative Selection Approach to Intrusion Detection

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7597))

Abstract

An negative selection algorithm is presented for intrusion detection tasks for systems with arbitrary diversity. This algorithm uses two types of agents, detectors and presenters. Presenters present information to detectors; detectors are selected to engage in a maximally frustrated dynamics when presenters present data from a reference state. We show that if presenters present information that has never been available during the selection stage, then presenters engage in a less frustrated dynamics and their abnormal presentation can be detected. The performance of our algorithm is independent of the dimension of the space, i.e., the length of information presented by presenters, and hence does not suffer from the dimensionality curse accompanying current methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hervé Debar, M.D., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computational Networks (31), 805–822 (1999)

    Google Scholar 

  2. Forrest, S., Beauchemin, C.: Computer immunology. Immunological Reviews 216, 176–197 (2007)

    Google Scholar 

  3. Forrest, S., et al.: Self-Nonself Discrimination in a Computer. In: Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202–212 (1994)

    Google Scholar 

  4. Bereta, M.Ç., Burczynski, T.: Immune K-means and negative selection algorithms for data analysis. Information Sciences 179(10), 1407–1425 (2009)

    Article  Google Scholar 

  5. Dasgupta, D., Niño, L.F.: Immunological computation: theory and applications, vol. xviii, p. 277. CRC, Boca Raton (2009)

    Google Scholar 

  6. Greensmith, J., Aickelin, U., Tedesco, G.: Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fusion 11(1), 21–34 (2010)

    Article  Google Scholar 

  7. Hone, A., et al.: Theoretical advances in artificial immune systems. Theoretical Computer Science 403(1), 11–32 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  8. Kim, J., et al.: Immune system approaches to intrusion detection – a review. Natural Computing 6(4), 413–466 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  9. Xie, Z.X., et al.: A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classifier. In: Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, pp. 446–453 (2006)

    Google Scholar 

  10. Wang, D.W., Xue, Y.B., Dong, Y.F.: Anomaly Detection Using Neighborhood Negative Selection. Intelligent Automation and Soft Computing 17(5), 595–605 (2011)

    Article  Google Scholar 

  11. Yang, X., Aldrich, C., Maree, C.: Detecting change in dynamic process systems with immunocomputing. Minerals Engineering 20(2), 103–112 (2007)

    Article  Google Scholar 

  12. Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evolutionary Computation 15(2), 223–251 (2007)

    Article  Google Scholar 

  13. Stibor, T., Timmis, J.I., Eckert, C.: On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol. 4163, pp. 215–228. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Kim, J., Bentley, P.J.: Negative Selection within an Artificial Immune for Network Intrusion Detection. In: 14th Annual Fall Symposium of the Korean Information Processing Society, Seoul, Korea (2000)

    Google Scholar 

  15. Mckeithan, T.W.: Kinetic Proofreading in T-Cell Receptor Signal-Transduction. Proceedings of the National Academy of Sciences of the United States of America 92(11), 5042–5046 (1995)

    Article  Google Scholar 

  16. de Abreu, F.V., et al.: Cellular Frustration: A New Conceptual Framework for Understanding Cell-Mediated Immune Responses. In: Bersini, H., Carneiro, J., et al. (eds.) ICARIS 2006. LNCS, vol. 4163, pp. 37–51. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Lindo, A., Faria, B., de Abreu, F.: Tunable kinetic proofreading in a model with molecular frustration. Theory in Biosciences, 1–8

    Google Scholar 

  18. de Abreu, F.V., Mostardinha, P.: Maximal frustration as an immunological principle. Journal of the Royal Society Interface 6(32), 321–334 (2009)

    Article  Google Scholar 

  19. Abbas, A.K., Lichtman, A.H.: Basic Immunology: Functions and Disorders of the Immune System. W B SAUNDERS (2010)

    Google Scholar 

  20. Janeway, C.: Immunobiology five. Garland Pub. (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mostardinha, P., Faria, B.F., Zúquete, A., Vistulo de Abreu, F. (2012). A Negative Selection Approach to Intrusion Detection. In: Coello Coello, C.A., Greensmith, J., Krasnogor, N., Liò, P., Nicosia, G., Pavone, M. (eds) Artificial Immune Systems. ICARIS 2012. Lecture Notes in Computer Science, vol 7597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33757-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33757-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33756-7

  • Online ISBN: 978-3-642-33757-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics