A Discriminatory Model of Self and Nonself Network Traffic

作者: Adetunmbi A. O , Olubadeji Bukky , Alese B. K , Adeola O. S , None

DOI:

关键词: Knowledge extractionHost (network)Data miningExpert systemEngineeringChange detectionSignature (logic)Intrusion detection systemDatabase transactionThe Internet

摘要: The matrix of business and other transaction systems over the Internet makes co mputer security a critical issue in our day-to-day activities. In recent times, various approaches ranging from rule-based, expert system to data mining have been subjected extensive research handling breaches on computer networks. Immune (IS) presents protection against possibility malfunctioning failure individual host cells. mammals it keeps organisms free pathogens which are unfriendly foreign organisms, cells, or mo lecules. Two change detection based generation T-cells were examined. One is an existing model while proposed by us, one us called immunological model, wh ich capable autonomously detecting (Nonself) opposing attempts at intrusion explo itation. two models implemented using C++ programming language their feasibility determined 1999 International Knowledge Discovery Intrusion Detection Datasets. results reveal that outperforms not only terms accuracy but also simplicity exp lainable ru les inform if ... then statements. classification christened IMSNT train ing test Datasets 97.06% 86.39% as 89.65% 85.70% Stephanie et al approach, shows pro mising approach. apart fro m its capability monitoring activities network can be used extracting virus signature patterns.

参考文章(15)
Adetunmbi Adebayo Olusola, Oladele S Adeola, Oladuni Abosede Daramola, None, Relevance Features Selection for Intrusion Detection Springer, New York, NY. pp. 407- 418 ,(2011) , 10.1007/978-1-4614-0373-9_31
Sandeep Kumar, Classification and detection of computer intrusions Purdue University. ,(1996)
Gene Spafford, Simson Garfinkel, Practical Unix and Internet security (2nd ed.) O'Reilly & Associates, Inc.. ,(1996)
Wenke Lee, Salvatore J. Stolfo, A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 227- 261 ,(2000) , 10.1145/382912.382914
Steven Andrew Hofmeyr, Stephanie Forrest, An immunological model of distributed detection and its application to computer security The University of New Mexico. ,(1999)
Rui Chao, Ying Tan, A Virus Detection System Based on Artificial Immune System computational intelligence and security. ,vol. 1, pp. 6- 10 ,(2009) , 10.1109/CIS.2009.106
Stephen Northcutt, Judy Novak, Donald McLachlan, Network Intrusion Detection: An Analyst's Handbook ,(2000)
Anil Somayaji, Steven A. Hofmeyr, Thomas A. Longstaff, Stephanie Forrest, A sense of self for Unix processes ieee symposium on security and privacy. pp. 120- 128 ,(1996) , 10.5555/525080.884258
S. Forrest, A.S. Perelson, L. Allen, R. Cherukuri, Self-nonself discrimination in a computer ieee symposium on security and privacy. pp. 202- 212 ,(1994) , 10.1109/RISP.1994.296580