A Review: AIS Based Intrusion Detection System

Prevention of security breaches completely using the existing security technologies is unrealistic. As a result, intrusion detection is an important component in network security. However, many current intrusion detection systems (IDSs) are signature-based systems, The signature based IDS also known as misuse detection looks for a specific signature to match, signalling an intrusion. Provided with the signatures or patterns, they can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. The rate of false positives is small to nil but these types of systems are poor at detecting new attacks, variations of known attacks or attacks that can be masked as normal behaviour. In this paper we evaluate the performance of various network based IDS technique and give a bird eye over existing IDS technique and their terminology.

[1]  Jiang Rong,et al.  An Anomaly Detection System Based on Dendritic Cell Algorithm , 2009, 2009 Third International Conference on Genetic and Evolutionary Computing.

[2]  Salvatore J. Stolfo,et al.  Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.

[3]  Chung-Ming Ou,et al.  Intrusion detection systems adapted from agent-based artificial immune systems , 2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011).

[4]  Baoyi Wang,et al.  A New Intrusion Detection Method Based on Artificial Immune System , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[5]  Lei Deng,et al.  Research on Immune Based Adaptive Intrusion Detection System Model , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[6]  Manas Ranjan Patra,et al.  NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .

[7]  Jianyong Liu,et al.  Intrusion Detection Based on Immune Dynamical Matching Algorithm , 2010, 2010 International Conference on E-Business and E-Government.

[8]  Zhong-Yang Xiong,et al.  A Novel Method of Intrusion Detection Based on Artificial Immune System , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[9]  Irina Tudor,et al.  Analyzing Information Security Issues Using Data Mining Techniques , 2008 .

[10]  S. Al-Sharafat,et al.  Adaptive Framework for Network Intrusion Detection by Using Genetic-Based Machine Learning Algorithm , 2009 .

[11]  Gürsel Serpen,et al.  Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.

[12]  Luo Wanbo,et al.  Intrusion Response Model Based on AIS , 2010, 2010 International Forum on Information Technology and Applications.

[13]  Yan Ma,et al.  Real-time feature selection in traffic classification , 2008 .

[14]  Mohammad Zulkernine,et al.  A hybrid network intrusion detection technique using random forests , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[15]  Li Zhi-tang,et al.  A novel fuzzy anomaly detection algorithm based on artificial immune system , 2005, Eighth International Conference on High-Performance Computing in Asia-Pacific Region (HPCASIA'05).