Intrusion Detection Technique based on Dendritic Cell Algorithm and Dempster Belief Theory
نویسندگان
چکیده
Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in intrusion detection systems. Recently Artificial immune system (AIS) has been applied for anomaly based intrusion detection in computer networks. Artificial immune system is a new technique which is applied for solving various problems in the field of information security. In this paper we presents a intrusion detection system based on one of the algorithm of artificial immune system called the Dendritic Cell Algorithm (DCA) and Dempster–Belief Theory (DBT) in order to minimise the rate of the generation of intrusion detection system , false positive rate and improve correlation factor in the designed intrusion detection system. With the help of Dempster–Belief theory we calculate the degree of uncertainty and with the help of event gathering calculate the entropy, which help us to determine the intrusion in the given system. Data having higher entropy is regarded as the “intruder” and generate the alarm. Thus with the help of this dual detection technique we can not only minimize the false positive and false negative rate but also improved the correlation technique and decrease the intrusion rate in the system. KeywordsArtificial Immune System, intrusion detection system, human immune system, danger theory, negative selection algorithm, DCA, Dempster–Belief theory.
منابع مشابه
Improving Dendritic Cell Algorithm by Dempster Belief Theory
This paper presents a novel method of intrusion detection based on artificial immune system. Adopting the dendritic cell algorithm and dempster –belief theory ,a novel solution is presented to identify all intrusion correctly and minimized the false alarm generation. In order to increase the accuracy of intrusion detection we apply the theory of statistical reasoning called Dempsterbelief theor...
متن کاملSTLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملطراحی سامانۀ تشخیص دستبرد ادبی جملهبنیاد در متون فارسی به کمک همجوشی گواهها
Today, there are many documents on Internet, such that users can generate new documents by coping them and existing Plagiarism Detection systems (PDS) couldn't detect all kind of plagiarism. The main challenge is finding a suitable algorithm to improving the amount of similar documents and their assessing time. It’s difficult to do assessing similarity in Persian texts that different characteri...
متن کاملA Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule
Cloud computing has established a new horizon in the field of Information Technology. Due to the large number of users and extensive utilization, the Cloud computing paradigm attracts intruders who exploit its vulnerabilities. To secure the Cloud environment from such intruders an Intrusion Detection System (IDS) is required. In this paper the authors have proposed an anomaly based IDS which cl...
متن کاملA Network Intrusion Detection Method Using Dempster-shafer Theory
An intrusion detection system (IDS) detects unauthorized manipulations of computer systems. Operation as feature reduction (including feature extraction and feature selection) plays an important role in the sense of improving classification performance and reducing the computational complexity of intrusion detection system. Feature reduction is even more important at online detection when less ...
متن کامل