Application of Artificial Immune System Algorithms in Anomaly Detection

被引:1
|
作者
Das, Rama Krushna [1 ]
Panda, Manisha [2 ]
Dash, Sanghamitra [3 ]
Dash, Sweta Shree [4 ]
机构
[1] Natl Informat Ctr, Berhampur, India
[2] Parala Maharaja Engn Coll, Berhampur, India
[3] Berhampur Univ, Dept Elect Sci, Berhampur, India
[4] Inst Tech Educ & Res, Dept CSE, Bhubaneswar, India
关键词
Anomaly detection; Artificial immune system; Intrusion detection system; Accuracy; Specificity; False Negative Rate (FNR); False Discovery Rate (FDR) and Negative Predicted Value (NPV);
D O I
10.1007/978-981-10-7871-2_66
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Anomaly detection is a concept which is widely applied to a number of domains. Anomaly-based intrusion detection system (ABIDS) has the ability to detect previously unknown attacks which are important since new vulnerabilities and attacks are constantly appearing. There are several techniques of anomaly detection techniques which are developed over the years, practically and in research area to observe new attacks on the network systems. This paper proposes the better artificial immune system (AIS) algorithm for anomaly detection. We have taken two datasets; one is the NSL-KDD dataset which purely focuses on intrusion detection (ID) and another Adult dataset which is not meant for ID. Here, we have performed our assessment by using the NSL-KDD dataset which is an altered version of the broadly utilized KDDcup99 dataset. The evaluation for selection of better AIS algorithm is done by several parameters such as accuracy, specificity, False Negative Rate, False discovery Rate, and Negative Predicted Value.
引用
收藏
页码:687 / 694
页数:8
相关论文
共 50 条
  • [1] Artificial Immune System for Anomaly Detection
    Hong, Lu
    2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 340 - 343
  • [2] Evaluating Artificial Immune System Algorithms for Intrusion Detection
    Pump, Richard
    Ahlers, Volker
    Koschel, Arne
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 92 - 97
  • [3] Application of Artificial Immune System Algorithms on Healthcare Data
    Das, Rama Krushna
    Panda, Manisha
    Mahapatra, Nirupama
    Dash, Sweta Shree
    2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2017, : 110 - 114
  • [4] Application of artificial immune algorithms in multiple sensor system
    ZhengQiao. Ji
    Q. M. Jonathan. Wu
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 175 - +
  • [5] Anomaly Detection with Artificial Immune Network
    PENG Lingxi1
    2. School of Information
    Wuhan University Journal of Natural Sciences, 2007, (05) : 951 - 954
  • [6] Artificial immune system based intrusion detection: anomaly detection and feature selection
    Abas, Eman Abd El Raoof
    Abdelkader, Hatem
    Keshk, Arabi
    2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 542 - 546
  • [7] An efficient proactive artificial immune system based anomaly detection and prevention system
    Saurabh, Praneet
    Verma, Bhupendra
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 60 : 311 - 320
  • [8] An Artificial Immune System approach to Anomaly Detection in Multimedia Ambient Intelligence
    Gianini, Gabriele
    Anisetti, Marco
    Azzini, Antonia
    Bellandi, Valerio
    Damiani, Ernesto
    Marrara, Stefania
    2009 3RD IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2009, : 512 - 516
  • [9] An integrated fuzzy ants and artificial immune recognition system for anomaly detection
    Srinoy, Surat
    Kurutach, Werasak
    2006 SICE-ICASE INTERNATIONAL JOINT CONFERENCE, VOLS 1-13, 2006, : 3599 - +
  • [10] A novel fuzzy anomaly detection algorithm based on artificial immune system
    Li Zhi-tang
    Li Yao
    Wang Li
    Eighth International Conference on High-Performance Computing in Asia-Pacific Region, Proceedings, 2005, : 479 - 483