An Intrusion Protection Model Based on Artificial Immune

In this paper, we have proposed a new immune-based model for detecting and preventing network intrusions. The proposed approach can quantively detect the massive network intrusion in time, where a new scheme of bacterin is presented for quickly detecting the similar intrusion in neighbor networks. Comparing with traditional methords, it has the advantages of distributed computing, self-learning, self-adapting, etc

[1]  L.N. de Castro,et al.  An artificial immune network for multimodal function optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[2]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[3]  F. Burnet The clonal selection theory of acquired immunity , 1959 .

[4]  Tao Li,et al.  An Immune-Based Model for Computer Virus Detection , 2005, CANS.

[5]  T. Kepler,et al.  Somatic hypermutation in B cells: an optimal control treatment. , 1993, Journal of theoretical biology.

[6]  Rodolphe Ortalo,et al.  Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..

[7]  Steven R. LeClair,et al.  IPMM'97 Australasia-Pacific Forum on Intelligent Processing and Manufacturing of Materials , 1997 .

[8]  Tao Li,et al.  An immune based dynamic intrusion detection model , 2005 .

[9]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[10]  Bharat B. Madan,et al.  Modeling and quantification of security attributes of software systems , 2002, Proceedings International Conference on Dependable Systems and Networks.

[11]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[12]  T. Bass,et al.  Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems , 1999 .

[13]  Tao Li,et al.  An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.

[14]  Scott Hazelhurst,et al.  Algorithms for improving the dependability of firewall and filter rule lists , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[15]  Chunlin Xu,et al.  A Weather Forecast System Based on Artificial Immune System , 2005, ICNC.

[16]  Tao Li,et al.  A New Model for Dynamic Intrusion Detection , 2005, CANS.

[17]  Tomas Olovsson,et al.  A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..

[18]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.