作者: Adetunmbi A. O , Olubadeji Bukky , Alese B. K , Adeola O. S , None
DOI:
关键词: Knowledge extraction 、 Host (network) 、 Data mining 、 Expert system 、 Engineering 、 Change detection 、 Signature (logic) 、 Intrusion detection system 、 Database transaction 、 The Internet
摘要: The matrix of business and other transaction systems over the Internet makes co mputer security a critical issue in our day-to-day activities. In recent times, various approaches ranging from rule-based, expert system to data mining have been subjected extensive research handling breaches on computer networks. Immune (IS) presents protection against possibility malfunctioning failure individual host cells. mammals it keeps organisms free pathogens which are unfriendly foreign organisms, cells, or mo lecules. Two change detection based generation T-cells were examined. One is an existing model while proposed by us, one us called immunological model, wh ich capable autonomously detecting (Nonself) opposing attempts at intrusion explo itation. two models implemented using C++ programming language their feasibility determined 1999 International Knowledge Discovery Intrusion Detection Datasets. results reveal that outperforms not only terms accuracy but also simplicity exp lainable ru les inform if ... then statements. classification christened IMSNT train ing test Datasets 97.06% 86.39% as 89.65% 85.70% Stephanie et al approach, shows pro mising approach. apart fro m its capability monitoring activities network can be used extracting virus signature patterns.