Skip to main content

An Immunity-Based Dynamic Multilayer Intrusion Detection System

  • Conference paper
Computational Intelligence and Bioinformatics (ICIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNBI,volume 4115))

Included in the following conference series:

Abstract

A real computer network produces new network traffic continuously in real time, thus the normal behaviors of network traffic are different in different time, but the self set of current network detection systems based on immunity are static. If the network environments change, the false negative rates and false positive rates will increase rapidly. So the traditional method can not adapt to changing network environments. In order to get over the limitation of the traditional means, an immunity-based dynamic intrusion detection system is proposed in this paper. In the proposed model, a dynamic renewal process of self set is described in detail. In addition, we establish a new set to improve the detection precision and shorten the training phase by adding the characters of the current known attacks to memory cell set. The experimental results show that the new model not only reduces the false negative rates and false positive rates effectively but also has the feature to adapt to continuous changing network environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Steven, A.H.: An Immunological Model of Distributed Detection and Its Application to Computer Security. USA, University of New Mexico (1999)

    Google Scholar 

  2. Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  3. Jonathan, I.T.: Artificial Immune System:A Ovel Data Analysis Technique Inspired by The Immune Network Theory. University of Wales, Wales (2001)

    Google Scholar 

  4. Kim, J.W., Bentley, P.J.: Towards An Artificial Immune System for Network Intrusion Detection. The Congress on Evolutionary Computation, Honolulu, 1015–1020 (2002)

    Google Scholar 

  5. Kim, J.W., Bentley, P.J.: Immune Memory in the Dynamic Clonal Selection Algorithm. In: Proceedings of the First International Conference on Artificial Immune Systems (ICARIS), Canterbury, pp. 57–65 (2002)

    Google Scholar 

  6. Inoue, H., Forrest, S.: Anomaly Intrusion Detection in Dynamic Execution Environments. In: New Security Paradigms Workshops (2002)

    Google Scholar 

  7. Li, T.: Idid: An Immunity-Based Dynamic Intrusion Detection Model. Science in china, 1912–1919 (2005)

    Google Scholar 

  8. Esponda, F., Forrest, S., Helman, P.: A Formal Framework for Positive and Negative Detection. IEEE Transactions on Systems, Man, and Cybernetics 34, 357–373 (2004)

    Article  Google Scholar 

  9. Esponda, F., Forrest, S., Helman, P.: Positive and Negative Detection. IEEE Transactions on Systems, Man and Cybernetics (2002)

    Google Scholar 

  10. Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. In: Evolutionary Computation, vol. 7(1), pp. 1289–1296. Morgan-Kaufmann, San Francisco (2000)

    Google Scholar 

  11. Kim, J.W.: Integrating Artificial Immune Algorithms for Intrusion Detection, PhD Thesis, Department of Computer Science, University College London (2002)

    Google Scholar 

  12. Chao, D.L., Davenport, M.P., Forrest, S., Perelson, A.S.: Stochastic Stage-Structured.: Modeling of the Adaptive Immune System. In: Proceedings of the IEEE Computer Society Bioinformatics Conference, pp. 124–131 (2003)

    Google Scholar 

  13. Li, T.: A New Model for Dynamic Intrusion Detection. LNCS, pp. 72–84. Springer, Berlin, Heidelberg, New York (2005)

    Google Scholar 

  14. Li, T.: An Immune Based Dynamic Intrusion Detection Model. Chinese Science Bulletin, 2650–2657 (2005)

    Google Scholar 

  15. Li, T.: An Immunity Based Network Security Risk Estimation. Science in China Ser. F Information Sciences, 557–578 (2005)

    Google Scholar 

  16. Li, T.: An Immune-Based Model for Computer Virus Detection. LNCS, pp. 59–71. Springer, Berlin, Heidelberg, New York (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liang, G., Li, T., Ni, J., Jiang, Y., Yang, J., Gong, X. (2006). An Immunity-Based Dynamic Multilayer Intrusion Detection System. In: Huang, DS., Li, K., Irwin, G.W. (eds) Computational Intelligence and Bioinformatics. ICIC 2006. Lecture Notes in Computer Science(), vol 4115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11816102_68

Download citation

  • DOI: https://doi.org/10.1007/11816102_68

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37277-6

  • Online ISBN: 978-3-540-37282-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics