Intelligent Cyber Defense System

In this paper a novel method for detection of network attacks and malicious code is described. The method is based on main principles of Artificial Immune Systems where immune detectors have an Artificial Neural Network’s structure. The main goal of proposed approach is to detect unknown, previous unseen cyber attacks (malicious code, intrusion detection, etc.). The mechanism of evolution of the neural network immune detectors allows increasing the detection rate. The proposed Intelligent Cyber Defense System can increase the reliability of intrusion detection in computer systems and, as a result, it may reduce financial losses of companies from cyber attacks.

[1]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[2]  E. Benjamini,et al.  Immunology: A Short Course , 1988 .

[3]  S. Srinoy,et al.  Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering , 2006, 2006 International Conference on Hybrid Information Technology.

[4]  Julie A. Dickerson,et al.  Fuzzy intrusion detection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).

[5]  James Cannady Applying CMAC-based online learning to intrusion detection , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[6]  Jerne Nk Towards a network theory of the immune system. , 1974 .

[7]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[8]  Kimmo Hätönen,et al.  A computer host-based user anomaly detection system using the self-organizing map , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[9]  Timo Horeis Intrusion Detection with Neural Networks – Combination of Self-Organizing Maps and Radial Basis Function Networks for Human Expert Integration , .

[10]  Fabio A. González,et al.  The Effect of Binary Matching Rules in Negative Selection , 2003, GECCO.

[11]  Stephanie Forrest,et al.  Coverage and Generalization in an Artificial Immune System , 2002, GECCO.

[12]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[13]  Claudia Eckert,et al.  An Investigation of R-Chunk Detector Generation on Higher Alphabets , 2004, GECCO.

[14]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[15]  Taia T. Wang,et al.  Immunity by Design. , 2018, Cell host & microbe.

[16]  Vladimir A. Golovko,et al.  Intelligent system for detection of networking intrusion , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.

[17]  Francisco Ibarra,et al.  Application of Neural Networks in Network Control and Information Security , 2006, ISNN.

[18]  K. P. Murphy,et al.  Janeway's immunobiology , 2007 .

[19]  Hai Jin,et al.  Network-Based Anomaly Detection Using an Elman Network , 2005, ICCNMC.

[20]  F. Burnet The clonal selection theory of acquired immunity , 1959 .

[21]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  L. Ibrahim ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .

[23]  Peter J. Bentley,et al.  Artificial Immune Systems , 2004, Lecture Notes in Computer Science.

[24]  Vladimir A. Golovko,et al.  Development of neural network immune detectors for computer attacks recognition and classification , 2013, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS).

[25]  Julie Greensmith,et al.  The Deterministic Dendritic Cell Algorithm , 2008, ICARIS.

[26]  R. Gershon,et al.  "Clonal selection and after," and after. , 1979, The New England journal of medicine.

[27]  Prasert Kanthamanon,et al.  Hybrid Neural Networks for Intrusion Detection System , 2002 .

[28]  Sang-Kyoon Kim,et al.  An intrusion detection system using principal component analysis and time delay neural network , 2005, Proceedings of 7th International Workshop on Enterprise networking and Computing in Healthcare Industry, 2005. HEALTHCOM 2005..

[29]  Francisco Maciá Pérez,et al.  Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics , 2009, IWANN.

[30]  Chunlin Zhang,et al.  Comparison of BPL and RBF Network in Intrusion Detection System , 2003, RSFDGrC.