An immune based dynamic intrusion detection model

With the dynamic description method for self and antigen, and the concept of dynamic immune tolerance for lymphocytes in network-security domain presented in this paper, a new immune based dynamic intrusion detection model (Idid) is proposed. In Idid, the dynamic models and the corresponding recursive equations of the lifecycle of mature lymphocytes, and the immune memory are built. Therefore, the problem of the dynamic description of self and nonself in computer immune systems is solved, and the defect of the low efficiency of mature lymphocyte generating in traditional computer immune systems is overcome. Simulations of this model are performed, and the comparison experiment results show that the proposed dynamic intrusion detection model has a better adaptability than the traditional methods.

[1]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[2]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[4]  Jonathan Timmis,et al.  Artificial immune systems as a novel soft computing paradigm , 2003, Soft Comput..

[5]  Thomas Bäck,et al.  An Overview of Evolutionary Computation , 1993, ECML.

[6]  Rogério de Lemos,et al.  Negative Selection: How to Generate Detectors , 2002 .

[7]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[8]  Dipankar Dasgupta,et al.  Immunity-Based Intrusion Detection System: A General Framework , 1999 .

[9]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[10]  G. Weisbuch,et al.  Immunology for physicists , 1997 .

[11]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[12]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[13]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[14]  Xiao Ren Artificial Immune System: Principle, Models, Analysis and Perspectives , 2002 .

[15]  Jiao Li,et al.  Development and Prospect of the Artificial Immune System , 2003 .

[16]  Tao Li,et al.  An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.