An Intrusion Detection Method Based on Changes of Antibody Concentration in Immune Response

被引:5
|
作者
Zhang, Ruirui [1 ]
Xiao, Xin [2 ]
机构
[1] Sichuan Agr Univ, Sch Business, Yaan, Peoples R China
[2] Southwest Minzu Univ, Sch Comp Sci, Chengdu, Sichuan, Peoples R China
来源
关键词
Antibody Concentration; Artificial Immune; Cloud Model; Evolutionary Algorithms; Intrusion Detection; ARCHITECTURE;
D O I
10.3745/JIPS.03.0108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although the research of immune-based anomaly detection technology has made some progress, there are still some defects which have not been solved, such as the loophole problem which leads to low detection rate and high false alarm rate, the exponential relationship between training cost of mature detectors and size of self-antigens. This paper proposed an intrusion detection method based on changes of antibody concentration in immune response to improve and solve existing problems of immune based anomaly detection technology. The method introduces blood relative and blood family to classify antibodies and antigens and simulate correlations between antibodies and antigens. Then, the method establishes dynamic evolution models of antigens and antibodies in intrusion detection. In addition, the method determines concentration changes of antibodies in the immune system drawing the experience of cloud model, and divides the risk levels to guide immune responses. Experimental results show that the method has better detection performance and adaptability than traditional methods.
引用
收藏
页码:137 / 150
页数:14
相关论文
共 50 条
  • [31] An Intrusion Detection Method Based on Outlier Ensemble Detection
    Huang, Bin
    Li, Wen-fang
    Chen, De-li
    Shi, Liang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 600 - +
  • [32] An Intrusion Detection Method Using Artificial Immune System Approach
    Lyngdoh, Juniorika
    Hussain, Md Iftekhar
    Majaw, Suktilang
    Kalita, Hemanta Kumar
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 379 - 387
  • [33] Immune-based dynamic intrusion response model
    Liu, SunJun
    Li, Tao
    Zhao, Kui
    Yang, Jin
    Gong, Xun
    Zhang, JianHua
    SIMULATED EVOLUTION AND LEARNING, PROCEEDINGS, 2006, 4247 : 96 - 103
  • [34] Anomaly intrusion detection method based on HMM
    Qiao, Y
    Xin, XW
    Bin, Y
    Ge, S
    ELECTRONICS LETTERS, 2002, 38 (13) : 663 - 664
  • [35] An intrusion detection method based on graph theory
    Bao, Zhen
    He, Di
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (09): : 1176 - 1180
  • [36] An intrusion detection method based on SVM and KPCA
    Li, Yuan-Cheng
    Wang, Zhong-Qiang
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1462 - 1466
  • [37] AN INTRUSION DETECTION METHOD BASED ON KICA AND SVM
    Li, Yuancheng
    Wang, Zhongqiang
    Ma, Yinglong
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2141 - 2144
  • [38] Intrusion Detection Method based on Frequent Pattern
    Yu, Jie
    Yao, GuoXiang
    Zhang, WeiWei
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 1751 - 1754
  • [39] An intrusion detection method based on granular autoencoders
    Lin, Sihong
    Zhang, Kunbin
    Guan, Dun
    He, Linjie
    Chen, Yumin
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 44 (05) : 8413 - 8424
  • [40] A Dynamic Resampling Based Intrusion Detection Method
    Zhao, Yaochi
    Yu, Dongyang
    Hu, Zhuhua
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT I, 2023, 14086 : 454 - 465