Negative Selection Approach Application in Network Intrusion Detection Systems

作者: Ahmad Taher Azar , Sanaa El-Ola Hanafy , Aboul Ella Hassanien , Amira Sayed A. Aziz

DOI:

关键词:

摘要: Abstract—Nature has always been an inspiration to researcherswith its diversity and robustness of systems, ArtificialImmune Systems are one them. Many algorithms were inspiredby ongoing discoveries biological immune systems techniquesand approaches. One the basic most common approachis Negative Selection Approach, which is simple easy toimplement. It was applied in many fields, but mostly anomalydetection for similarity idea. In this paper, areview given on application negative selection approachin network security, specifically intrusion detection system.As work field limited, we need understand whatthe challenges approach are. Recommendations givenby end paper future work. I. I NTRODUCTION Networks more vulnerable by time intrusions andattacks, from inside outside. Cyber-attacks makingnews headlines worldwide, as threats networks gettingbolder sophisticated. Reports 2011 2012are showing increase attacks, with Denial ofService (DoS) targeted attacks having a big share it.As reported web sites like [1] [2] [3], figures 1 2show motivations behind customer typesrespectively.Internal Advanced Persistent Threats (APT)are biggest network, they carefullyconstructed dangerous, due internal users’ privilegesto access resources. Figure 3 shows networksecurity concerns. With mind, increasing so-phistication new approaches protect networkresources under investigation, thatis concerned outside IntrusionDetection System.Intrusion [4] [5] [6] have around forquite some time, successful security system. An System (IDS) system that defines detectspossible within computer or gatheringand analysing information surrounding environment.

参考文章(37)
Dipankar Dasgupta, Fabio A. Gonzalez, An Imunogenetic Technique To Detect Anomalies In Network Traffic genetic and evolutionary computation conference. pp. 1081- 1088 ,(2002)
G.E. Liepens, H.S. Vaccaro, Intrusion detection: Its role and validation Computers & Security. ,vol. 11, pp. 347- 355 ,(1992) , 10.1016/0167-4048(92)90175-Q
Dipankar Dasgupta, Fabio Augusto Gonzalez, A study of artificial immune systems applied to anomaly detection The University of Memphis. ,(2003)
Emma Hart, Jonathan Timmis, Application areas of AIS: the past, the present and the future international conference on artificial immune systems. pp. 483- 497 ,(2005) , 10.1007/11536444_37
Costas Neocleous, Christos Schizas, Artificial Neural Network Learning: A Comparative Review hellenic conference on artificial intelligence. pp. 300- 313 ,(2002) , 10.1007/3-540-46014-4_27
Feng Gu, Julie Greensmith, Uwe Aickelin, Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows international conference on artificial immune systems. ,vol. 5132, pp. 142- 153 ,(2008) , 10.1007/978-3-540-85072-4_13
Jon Timmis, Challenges for artificial immune systems italian workshop on neural nets. pp. 355- 367 ,(2005) , 10.1007/11731177_42
Dat Tran, Dharmendra Sharma, Wanli Ma, Negative Selection with Antigen Feedback in Intrusion Detection international conference on artificial immune systems. pp. 200- 209 ,(2008) , 10.1007/978-3-540-85072-4_18
Lotfi Asker Zadeh, George J Klir, Bo Yuan, None, Fuzzy sets, fuzzy logic, and fuzzy systems : selected papers World Scientific. ,(1996)
Fabio A. González, Dipankar Dasgupta, Anomaly Detection Using Real-Valued Negative Selection Genetic Programming and Evolvable Machines. ,vol. 4, pp. 383- 403 ,(2003) , 10.1023/A:1026195112518