Artificial immune system based on interval type-2 fuzzy set paradigm

Abstract: This paper discusses the design and engineering of a biologically-inspired intrusion detection system, based on interval type-2 fuzzy set paradigm, for protecting computer networks. To this end, we have proposed a performance-based Artificial Immune System (AIS) that mimics the workings of an adaptive immune system and consists of a number of running artificial white blood cells, which search, recognize, store and deny anomalous behaviors on individual hosts. The proposed AIS monitors the system through analyzing the set of parameters to provide general information on its state. For the analysis, we have suggested a dynamic technique based on interval type-2 fuzzy set paradigm that enable identifying the system status - i.e. Non-Attack, Suspicious-Non-Attack, Non-Decidable, Suspicious-Attack, Attack. In conclusion, for proving the effectiveness of the suggested model, an exhaustive testing is conducted and results are reported.

[1]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[2]  Jerry M. Mendel,et al.  Centroid of a type-2 fuzzy set , 2001, Inf. Sci..

[3]  Anastasia Pagnoni,et al.  An innate immune system for the protection of computer networks , 2005 .

[4]  Jerry M. Mendel,et al.  Computing with words and its relationships with fuzzistics , 2007, Inf. Sci..

[5]  Uwe Aickelin,et al.  The Danger Theory and Its Application to Artificial Immune Systems , 2008, ArXiv.

[6]  Jerry M. Mendel,et al.  Interval type-2 fuzzy logic systems , 2000, Ninth IEEE International Conference on Fuzzy Systems. FUZZ- IEEE 2000 (Cat. No.00CH37063).

[7]  Victor A. Skormin,et al.  Immunocomputing - principles and applications , 2003 .

[8]  Jerry M. Mendel,et al.  Interval Type-2 Fuzzy Logic Systems Made Simple , 2006, IEEE Transactions on Fuzzy Systems.

[9]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[10]  I. Turksen Interval valued fuzzy sets based on normal forms , 1986 .

[11]  N. N. Karnik,et al.  Introduction to type-2 fuzzy logic systems , 1998, 1998 IEEE International Conference on Fuzzy Systems Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36228).

[12]  Jerry M. Mendel,et al.  Type-2 fuzzy sets made simple , 2002, IEEE Trans. Fuzzy Syst..

[13]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[14]  Masaharu Mizumoto,et al.  Some Properties of Fuzzy Sets of Type 2 , 1976, Inf. Control..

[15]  Stephanie Forrest,et al.  Revisiting LISYS: parameters and normal behavior , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[16]  Uwe Aickelin,et al.  Danger Theory: The Link between AIS and IDS? , 2003, ICARIS.

[17]  Jerry M. Mendel,et al.  Uncertainty bounds and their use in the design of interval type-2 fuzzy logic systems , 2002, IEEE Trans. Fuzzy Syst..

[18]  Jerry M. Mendel,et al.  Centroid uncertainty bounds for interval type-2 fuzzy sets: forward and inverse problems , 2004, 2004 IEEE International Conference on Fuzzy Systems (IEEE Cat. No.04CH37542).

[19]  Barak A. Pearlmutter,et al.  Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[20]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[21]  I. Turksen Interval-valued fuzzy sets and “compensatory AND” , 1992 .

[22]  Humberto Bustince,et al.  Mathematical analysis of interval-valued fuzzy relations: Application to approximate reasoning , 2000, Fuzzy Sets Syst..

[23]  Lotfi A. Zadeh,et al.  The Concepts of a Linguistic Variable and its Application to Approximate Reasoning , 1975 .

[24]  J. Mendel Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions , 2001 .

[25]  D. Dasgupta,et al.  Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.

[26]  I. Turksen Non-specificity and interval-valued fuzzy sets , 1996 .

[27]  I. Burhan Trk en Belief, plausibility, and probability measures on interval-valued type 2 fuzzy sets , 2004 .

[28]  John Waldron Proceedings of the 2004 international symposium on Information and communication technologies , 2004 .

[29]  Fabio A. González,et al.  An Imunogenetic Technique To Detect Anomalies In Network Traffic , 2002, GECCO.

[30]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[31]  C. Anderson,et al.  Danger: the view from the bottom of the cliff. , 2000, Seminars in immunology.

[32]  Stephanie Forrest,et al.  An immunological model of distributed detection and its application to computer security , 1999 .

[33]  Jonathan Timmis,et al.  Artificial immune systems - a new computational intelligence paradigm , 2002 .

[34]  Jerry M. Mendel,et al.  Footprint of uncertainty and its importance to type-2 fuzzy sets , 2002 .

[35]  I. Burhan Turksen,et al.  Belief, plausibility, and probability measures on interval-valued type 2 fuzzy sets , 2004 .