An Artificial Immune System Based on Holland's Classifier as Network Intrusion Detection

In this paper, an Artificial Immune System based on Hollandâs Classifier is proposed as a new method for network intrusion detection. This paper is not aimed to provide a comparative study but to give more understanding on the feasibility of combining Artificial Immune System and Hollandâs Classifier to detect network intrusion. This new Artificial Immune System, named AIS-CS, can attain higher than 90% intrusion detection with a false negative percentage below 10% and a fairly low false positive rate on a network composed of 50 regular nodes and 50 intruders. The experiments appear to suggest that the best performance can be found by setting the tolerization and the simulation parameters differently. Since there are numerous parameters involved, more experiments need to be performed to further measure this Holland classifier based Artificial Immune System.

[1]  Sugata Sanyal,et al.  Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[2]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[3]  Michael G. Solomon,et al.  Information Security Illuminated , 2004 .

[4]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[5]  John H. Holland,et al.  Cognitive systems based on adaptive algorithms , 1977, SGAR.

[6]  John H. Holland,et al.  Properties of the Bucket Brigade , 1985, ICGA.

[7]  Feixian Sun,et al.  An Immune Danger Theory Inspired Model for Network Security Monitoring , 2010, 2010 International Conference on Challenges in Environmental Science and Computer Engineering.

[8]  Peng Li,et al.  Design of a Four-Layer IDS Model Based on Immune Danger Theory , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[10]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[11]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[12]  Wei Li,et al.  Using Genetic Algorithm for Network Intrusion Detection , 2004 .