Analysis of Human Immune System Inspired Intrusion Detection System
نویسنده
چکیده
Artificial Immune Systems (AIS) are algorithms inspired by the human immune system. The human immune system is a robust, decentralized, error tolerant and adaptive system. Such properties are highly desirable for the development of novel computer systems. Unlike some other bio-inspired techniques, such as genetic algorithms and neural networks, the field of AIS encompasses a spectrum of algorithms to implement different functions. In this paper we investigate CLONALG for network intrusion classification. The Clonal Selection Algorithm (CLONALG) is inspired by the clonal selection theory of acquired immunity, which has shown success on broad range of engineering problem domains. Keywords— Network intrusion detection, Artificial Immune System, CLONALG, KDD dataset.
منابع مشابه
STLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملApoptosis Inspired Intrusion Detection System
Artificial Immune Systems (AIS), inspired by the human immune system, are algorithms and mechanisms which are self-adaptive and self-learning classifiers capable of recognizing and classifying by learning, long-term memory and association. Unlike other human system inspired techniques like genetic algorithms and neural networks, AIS includes a range of algorithms modeling on different immune me...
متن کاملImmune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still need to be designed for IT systems. The human immune system (HIS) can detect and defend against yet unseen intruders, is distributed, adaptive and multilayered to name only a few of its features. Our immune system incorpo...
متن کاملIntrusion Detection Based on the Immune Human System
In recent year, we have seen a growing interest in computational methods based upon natural phenomena with biologically inspired techniques, such as cellular automata, immune human systems, neural networks, DNA and molecular computing. Some of these solution techniques are classified under the realm of a general paradigm, called biocomputing. In this paper, we propose a security system for frau...
متن کاملMalicious Code Execution Detection and Response Immune System inspired by the Danger Theory
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system ...
متن کامل