Skip to main content

Integrated Membrane Computing Framework for Modeling Intrusion Detection Systems

  • Conference paper
  • First Online:
  • 945 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 681))

Abstract

Several activities take place within a network environment which include (but not restricted to) movement of traffics (packets) among the nodes. An Intrusion Detection system (IDS) which is primarily concerned with the monitoring of an information system with the sole aim of reporting activities which are symptomatic of an attack, needs constant review and upgrade to enhance its operations. In this work, we argue that two of the variants of Membrane computing (MC); spiking neural P (SNP) system and tissue-like P system could best be used as tools to enhance the activities and security properties of any computer network system. Therefore, this paper proposes an alternative but dependable integrated modeling framework which applies membrane computing paradigms to intrusion detection systems. This framework combines the membrane systems model for rule-based intrusion detection systems as well as attack detection model implemented on GPU for high throughput and detection speedup for checkmating packet loss/drop. MC is a newly introduced but yet to be fully explored technology in the area of network/information system security. It is a versatile, non-deterministic and maximally parallel computing model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Păun, G.: Introduction to membrane computing. In: Ciobanu, G., Păun, G., Pérez-Jiménez, M.J. (eds.) Applications of Membrane Computing, pp. 1–42. Springer, Heidelberg (2006)

    Google Scholar 

  • Păun, G., Rozenberg, G.: A guide to membrane computing. Theoret. Comput. Sci. 287, 73–100 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  • Jimenez M.J.P., Jimenez, A.R., Caparrini, F.S.: Complexity classes in models of cellular computing with membranes. Nat. Comput. 2(3), 265–285 (2003)

    Google Scholar 

  • Venter, H., Eloff, J.: A taxonomy for information security technologies. Comput. Secur. 22(4), 299–307 (2003)

    Article  Google Scholar 

  • Uma, M., Padmavathi, G.: A survey on various cyber attacks and their classiffication. Int. J. Netw. Secur. 15(6), 391–397 (2013)

    Google Scholar 

  • Folorunso, O., Akande, O.O., Ogunde, A.O., Vincent, O.R.: ID-SOMGA: a self organising migrating genetic algorithm-based solution for intrusion detection. Comput. Inf. Sci. 3(4), 80–92 (2010)

    Google Scholar 

  • Giorgos, V., Michalis, P., Sotiris, I.: Midea: a multi-parallel intrusion detection architecture. In: ACM Conference on Computer and Communications Security, pp. 297–308 (2011)

    Google Scholar 

  • Bulajoul, W., James, A., Pannu, M.: Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. Syst. Sci. 81, 981–999 (2014)

    Google Scholar 

  • Rietz, R., Vogel, M., Schuster, F., König, H.: Parallelization of network intrusion detection systems under attack conditions. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 172–191. Springer, Heidelberg (2014). doi:10.1007/978-3-319-08509-8_10

    Google Scholar 

  • Peng, H., Wang, J., Perez, M.J., Wang, H., Shao, J., Wang, T.: Fuzzy reasoning spiking neural P System for fault diagnosis. Inf. Sci. 235, 106–116 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  • Terrence, F.P.: Evolutionary optimization of a fuzzy rule-based network intrusion detection system. In: 2010 Annual Meeting of the North American Fuzzy Information Processing Society (NAFIPS), pp. 1–6 (2010)

    Google Scholar 

  • Mukkamala, S., Andrew, H.S.: Detecting denial of service attacks using support vector machines. In: The 12th IEEE International Conference on Fuzzy systems, vol. 2, pp. 1231–1236 (2003)

    Google Scholar 

  • Perez-Hurtado, I., Valencia–Cabrera, L., Chacon, J.M., Riscos–Nunez, A., Perez–Jimenez, M.J.: AP–Lingua based simulator for tissue P systems with cell separation. Sci. Technol. 17(1), 89–102 (2014)

    Google Scholar 

  • Ipate, F., Dragomir, C., Lefticaru, R., Mierla, L., Perez-Jimenez, M.D.J.: Using a kernel P system to solve the 3-col problem. In: Proceedings of the 13th International Conference on Membrane Computing, Computer and Automation Research Institute, Hungarian Academy of Sciences, pp. 243–258 (2012)

    Google Scholar 

  • Dash, M., Liu, H.: Dimensionality reduction. In: Wiley Encyclopedia of Computer Science and Engineering (2008)

    Google Scholar 

  • Lin, S.W., Ying, K.C., Lee, C.Y., Lee, Z.J.: An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl. Soft Comput. 12(10), 3285–3290 (2012)

    Article  Google Scholar 

  • El-Hajj, W., Aloul, F., Trabelsi, Z., Zaki, N.: On detecting port scanning using fuzzy based intrusion detection system. In: Wireless Communications and Mobile Computing Conference, IWCMC 2008, International, pp. 105–110 (2008)

    Google Scholar 

  • Alheeti, K.M.A., Hamed, R.I.: Application of a fuzzy neural network combined with an expert petri net system to intrusion detection system. In: The 13th International Arab Conference on Information Technology ACIT, pp. 10–13 (2012)

    Google Scholar 

  • Papadogiannakis, A., Polychronakis, M., Markatos, E.P.: Improving the accuracy of network intrusion detection systems under load using selective packet discarding. In: Proceedings of the Third European Workshop on System Security, pp. 15–21 (2010)

    Google Scholar 

  • Schaelicke, L., Freeland, J.C.: Characterizing sources and remedies for packet loss in network intrusion detection systems. In: 2005 Proceedings of the IEEE International Workload Characterization Symposium, pp. 188–196 (2005)

    Google Scholar 

  • Subhan, A., Akhlaq, M., Alserhani, F., Awan, I.U., Mellor, J., Cullen, A.J., Mirchandani, P.: Smart Logic - preventing packet loss in high speed network intrusion detection systems. In: Weerasinghe, D. (ed.) ISDF 2009. LNCS (LNICSSITE), vol. 41, pp. 57–65. Springer, Heidelberg (2010). doi:10.1007/978-3-642-11530-1_7

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravie Chandren Muniyandi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Idowu, R.K., Muniyandi, R.C., Othman, Z.A. (2016). Integrated Membrane Computing Framework for Modeling Intrusion Detection Systems. In: Gong, M., Pan, L., Song, T., Zhang, G. (eds) Bio-inspired Computing – Theories and Applications. BIC-TA 2016. Communications in Computer and Information Science, vol 681. Springer, Singapore. https://doi.org/10.1007/978-981-10-3611-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3611-8_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3610-1

  • Online ISBN: 978-981-10-3611-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics