Intrusion Detection Technique based on Dendritic Cell Algorithm and Dempster Belief Theory

نویسندگان

  • Kalpana Kumari
  • Anurag Jain
  • Swati Dongre
چکیده

Today traditional intrusion detection systems are unable to detect intrusion attacks. Huge number of false alarm generated by the system results in financial loss of an organization. The unique features of artificial immune system encourage and motivate the researchers to employ this technique in variety of applications and especially in intrusion detection systems. Recently Artificial immune system (AIS) has been applied for anomaly based intrusion detection in computer networks. Artificial immune system is a new technique which is applied for solving various problems in the field of information security. In this paper we presents a intrusion detection system based on one of the algorithm of artificial immune system called the Dendritic Cell Algorithm (DCA) and Dempster–Belief Theory (DBT) in order to minimise the rate of the generation of intrusion detection system , false positive rate and improve correlation factor in the designed intrusion detection system. With the help of Dempster–Belief theory we calculate the degree of uncertainty and with the help of event gathering calculate the entropy, which help us to determine the intrusion in the given system. Data having higher entropy is regarded as the “intruder” and generate the alarm. Thus with the help of this dual detection technique we can not only minimize the false positive and false negative rate but also improved the correlation technique and decrease the intrusion rate in the system. KeywordsArtificial Immune System, intrusion detection system, human immune system, danger theory, negative selection algorithm, DCA, Dempster–Belief theory.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Dendritic Cell Algorithm by Dempster Belief Theory

This paper presents a novel method of intrusion detection based on artificial immune system. Adopting the dendritic cell algorithm and dempster –belief theory ,a novel solution is presented to identify all intrusion correctly and minimized the false alarm generation. In order to increase the accuracy of intrusion detection we apply the theory of statistical reasoning called Dempsterbelief theor...

متن کامل

STLR: a novel danger theory based structural TLR algorithm

Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...

متن کامل

طراحی سامانۀ تشخیص دستبرد ادبی جمله‌بنیاد در متون فارسی به کمک هم‌جوشی گواه‌ها

Today, there are many documents on Internet, such that users can generate new documents by coping them and existing Plagiarism Detection systems (PDS) couldn't detect all kind of plagiarism. The main challenge is finding a suitable algorithm to improving the amount of similar documents and their assessing time. It’s difficult to do assessing similarity in Persian texts that different characteri...

متن کامل

A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule

Cloud computing has established a new horizon in the field of Information Technology. Due to the large number of users and extensive utilization, the Cloud computing paradigm attracts intruders who exploit its vulnerabilities. To secure the Cloud environment from such intruders an Intrusion Detection System (IDS) is required. In this paper the authors have proposed an anomaly based IDS which cl...

متن کامل

A Network Intrusion Detection Method Using Dempster-shafer Theory

An intrusion detection system (IDS) detects unauthorized manipulations of computer systems. Operation as feature reduction (including feature extraction and feature selection) plays an important role in the sense of improving classification performance and reducing the computational complexity of intrusion detection system. Feature reduction is even more important at online detection when less ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012