Population-based cooperative artificial lymphocyte model for network intrusion detection

被引:0
|
作者
An, Hui-Yao [1 ,2 ]
Wu, Ze-Jun [2 ,3 ]
Wang, Xin-An [1 ,2 ]
Wang, Xiu-Yun [1 ,2 ]
机构
[1] School of Electronics Engineering and Computer Science, Peking University, Beijing 100871, China
[2] The Key Laboratory of Integrated Microsystems, Shenzhen Graduate School of Peking University, Shenzhen 518055, China
[3] International Software School, Wuhan University, Wuhan 430079, China
来源
关键词
Malware - Network security - Intrusion detection - Immune system - Denial-of-service attack;
D O I
暂无
中图分类号
学科分类号
摘要
Co-stimulation mechanism of lymphocytes was introduced to artificial immune system. About the application of network intrusion detection, concerning on three types of dangerous signals, including network-level, host-level and process-level, a novel artificial lymphocyte detection model was described for a targeted process of recognizing Denial of Service attacks, worms and Trojan, and experimental results were obtained. This model verifies cooperative capability of multi-lymphocyted and improved intrusion detection rate of artificial immune system.
引用
收藏
页码:122 / 130
相关论文
共 50 条
  • [1] A population-based incremental learning approach with artificial immune system for network intrusion detection
    Chen, Meng-Hui
    Chang, Pei-Chann
    Wu, Jheng-Long
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 51 : 171 - 181
  • [2] A Network Intrusion Detection Model Based on Artificial Immune
    Xiao, Xin
    Zhang, Rui Rui
    NATURAL RESOURCES AND SUSTAINABLE DEVELOPMENT, PTS 1-3, 2012, 361-363 : 687 - 690
  • [3] Network Intrusion Detection System Model Based On Artificial Immune
    Zhang Yanbin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 359 - 369
  • [4] Cooperative intrusion detection model based on scenario
    Teng, Shaohua
    Zhang, Wei
    Fu, Xiufen
    Tan, Wenwei
    PROCEEDINGS OF THE 2007 11TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2007, : 876 - +
  • [5] A cooperative network intrusion detection based on fuzzy SVMs
    Teng S.
    Du H.
    Wu N.
    Zhang W.
    Su J.
    Journal of Networks, 2010, 5 (04) : 475 - 483
  • [6] Intrusion detection approach based on artificial idiotypic network
    Zhao, Lin-Hui
    Dai, Ya-Ping
    Fu, Dong-Mei
    Dong, Fang-Yan
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2006, 26 (09): : 809 - 812
  • [7] Network Intrusion Detection Based on Explainable Artificial Intelligence
    Wang, Yiwen
    Xu, Lei
    Liu, Wanli
    Li, Rongzhen
    Gu, Junjie
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 131 (02) : 1115 - 1130
  • [8] Network intrusion detection based on artificial immune clustering
    Zhong, J. (zhongjiang@cqu.edu.cn), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [9] Network Intrusion Detection Based on Explainable Artificial Intelligence
    Yiwen Wang
    Lei Xu
    Wanli Liu
    Rongzhen Li
    Junjie Gu
    Wireless Personal Communications, 2023, 131 : 1115 - 1130
  • [10] A Cooperative Intrusion Detection Model Based on Granular Computing
    Zhang, Wei
    Teng, Shaohua
    Fu, Xiufen
    Fan, Jihui
    Teng, Yi
    Zhu, Haibin
    PROCEEDINGS OF THE 2013 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2013, : 325 - 331