The Use of Artificial Intelligence for the Intrusion Detection System in Computer Networks

We discuss the application of Artificial Intelligence for the design of intrusion detection systems (IDS) applied on computer networks. For this purpose, we use J48 rand Clonal-G [5] immune artificial system Algorithms, in WEKA software, with the purpose to classify and predict intrusions in KDD-Cup 1999 and Kyoto 2006 databases. We obtain for the KDD-Cup 1999 database 92.69% for ClonalG and 99.91% of precision for J48 respectively. For the Kyoto University 2006 database, we obtain 95.2% for ClonalG and 99.25% of precision for J48. Finally, based on these results we propose a model to detect intrusions using AI techniques. The main contribution of the paper is the adaptability of the CLONAL-G Algorithm and the reduction of database attributes by using Genetic Search.

[1]  Salah Al-Sharhan,et al.  ARTIFICIAL IMMUNE SYSTEMS - MODELS, ALGORITHMS AND APPLICATIONS , 2010 .

[2]  Zhou Ji,et al.  Artificial immune system (AIS) research in the last five years , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[3]  Qiao Yan,et al.  AINIDS: an immune-based network intrusion detection system , 2006, SPIE Defense + Commercial Sensing.

[4]  Luís Torgo,et al.  Data Mining with R: Learning with Case Studies , 2010 .

[5]  Vincenzo Cutello,et al.  Clonal Selection Algorithms: A Comparative Case Study Using Effective Mutation Potentials , 2005, ICARIS.

[6]  Isai Rojas González,et al.  Bayesian Network Application on Information Security , 2010 .

[7]  Salah Al-Sharhan,et al.  Advancement in Artificial Immune Systems: A perspective of models, algorithms and applications , 2009, 2009 5th IEEE GCC Conference & Exhibition.

[8]  Michael Hilker,et al.  SANA - Security Analysis in Internet Traffic through Artificial Immune Systems , 2006, Trustworthy Software.

[9]  Li Tao,et al.  A self-adaptive negative selection algorithm used for anomaly detection , 2009 .

[10]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[11]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[12]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[13]  Peter J. Bentley,et al.  An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .

[14]  Bruno Lara,et al.  Diseño e Implementación de un Sistema de Evaluación Remota con Seguridad Avanzada para Universidades Utilizando Minería de Datos , 2010 .

[15]  Itzhak Levin,et al.  KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.

[16]  Raúl Monroy,et al.  Formal Support to Security Protocol Development: A Survey , 2008, Computación y Sistemas.

[17]  Margaret H. Dunham,et al.  Data Mining: Introductory and Advanced Topics , 2002 .