Detecting Mixed-Type Intrusion in High Adaptability Using Artificial Immune System and Parallelized Automata

This study applies artificial immune system and parallelized finite-state machines to construct an intrusion detection algorithm for spotting hidden threats in massive number of packets. Existing intrusion detections are mostly not focused on adaptability for mixed and changing attacks, which results in low detection rate in new and mixed-type attacks. Using the characteristics of artificial immune and state transition can address the attacks in evolutionary patterns and track the anomalies in nonconsecutive packets. The proposed immune algorithm in this study is highly efficient based on a selection step in multi-island migration. Result shows that the algorithm can effectively detect mixed-type attacks and obtains an overall accuracy of 95.9% in testing data.

[1]  Chia-Nan Wang,et al.  A Multi-Criteria Decision Making (MCDM) for Renewable Energy Plants Location Selection in Vietnam under a Fuzzy Environment , 2018, Applied Sciences.

[2]  Claudia Eckert,et al.  On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system , 2005, 2005 IEEE Congress on Evolutionary Computation.

[3]  Yiqiang Sheng,et al.  A Graph Representation Learning Algorithm for Low-Order Proximity Feature Extraction to Enhance Unsupervised IDS Preprocessing , 2019, Applied Sciences.

[4]  Jiankun Hu,et al.  A novel statistical technique for intrusion detection systems , 2018, Future Gener. Comput. Syst..

[5]  Bo Lang,et al.  Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey , 2019, Applied Sciences.

[6]  Gerry V. Dozier,et al.  Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[7]  Yenming J. Chen,et al.  Multi-objective Pareto adaptive algorithm for capacitated lot-sizing problems in glass lens production , 2018 .

[8]  Luigi Barone,et al.  On XCSR for electronic fraud detection , 2012, Evol. Intell..

[9]  Andrew M. Tyrrell,et al.  Immunotronics - novel finite-state-machine architectures with built-in self-test using self-nonself differentiation , 2002, IEEE Trans. Evol. Comput..

[10]  Ying Chen,et al.  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.

[11]  W.W.Y. Ng,et al.  Refinement of rule-based intrusion detection system for denial of service attacks by support vector machine , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).

[12]  Shadi Aljawarneh,et al.  Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..

[13]  Youngjoo Shin A VM-Based Detection Framework against Remote Code Execution Attacks for Closed Source Network Devices , 2019 .

[14]  Bhupendra Verma,et al.  An efficient proactive artificial immune system based anomaly detection and prevention system , 2016, Expert Syst. Appl..

[15]  Timo D. Hämäläinen,et al.  Assessment of Deep Learning Methodology for Self-Organizing 5G Networks , 2019, Applied Sciences.

[16]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[17]  Robert C. Green,et al.  Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid , 2011, 2011 IEEE Power and Energy Society General Meeting.

[18]  Jin Cao,et al.  An Automata Based Intrusion Detection Method for Internet of Things , 2017, Mob. Inf. Syst..

[19]  Ben Rothke,et al.  Network Security: The Complete Reference , 2003 .

[20]  Ahmed Al-Saffar,et al.  Feature Adaptive and Cyclic Dynamic Learning Based on Infinite Term Memory Extreme Learning Machine , 2019, Applied Sciences.

[21]  Pei-Chann Chang,et al.  A population-based incremental learning approach with artificial immune system for network intrusion detection , 2016, Eng. Appl. Artif. Intell..

[22]  Tian-Syung Lan,et al.  Optimization of Machining Parameters Using Fuzzy Taguchi Method for Reducing Tool Wear , 2018, Applied Sciences.

[23]  Zafar Sultan Multiple Simultaneous Threat Detection in UNIX Environment , 2009 .