Immune System Based Intrusion Detection System (IS-IDS): A Proposed

被引:23
|
作者
Dutt, Inadyuti [1 ]
Borah, Samarjeet [1 ]
Maitra, Indra Kanta [2 ]
机构
[1] Sikkim Manipal Univ, Sikkim Manipal Inst Technol, Dept Comp Applicat, Majhitar 737136, India
[2] St Xaviers Univ, Controller Examinat Dept, Kolkata 700160, India
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Immune system; Intrusion detection; Pathogens; Adaptive systems; Telecommunication traffic; Anomaly detection; Payloads; Computer networks; computer security; intrusion detection; immune system; anomaly detection; network; T-cell; B-cell; innate immune system; adaptive immune system; FEATURES;
D O I
10.1109/ACCESS.2020.2973608
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores the immunological model and implements it in the domain of intrusion detection on computer networks. The main objective of the paper is to monitor, log the network traffic and apply detection algorithms for detecting intrusions within the network. The proposed model mimics the natural Immune System (IS) by considering both of its layers, innate immune system and adaptive immune system respectively. The current work proposes Statistical Modeling based Anomaly Detection (SMAD) as the first layer of Intrusion Detection System (IDS). It works as the Innate Immune System (IIS) interface and captures the initial traffic of a network to find out the first-hand vulnerability. The second layer, Adaptive Immune-based Anomaly Detection (AIAD) has been considered for determining the features of the suspicious network packets for detection of anomaly. It imitates the adaptive immune system by taking into consideration the activation of the T-cells and the B-cells. It captures relevant features from header and payload portions for effective detection of intrusion. Experiments have been conducted on both the real-time network traffic and the standard datasets KDD99 and UNSW-NB15 for intrusion detection. The SMAD model yields as high as 96.04%true positive rate and around 97% true positive rate using real-time traffic and standard data sets. Highly suspicious traffic detected in the SMAD model is further tested for vulnerability in the AIAD model. Results show significant true positive rate, closer to almost 99% of accurately detecting the file-based and user-based anomalies for both the real-time traffic and standard data sets.
引用
收藏
页码:34929 / 34941
页数:13
相关论文
共 50 条
  • [1] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953
  • [2] Classification of Intrusion Detection System (IDS) Based on Computer Network
    Effendy, David Ahmad
    Kusrini, Kusrini
    Sudarmawan, Sudarmawan
    [J]. 2017 2ND INTERNATIONAL CONFERENCES ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE): OPPORTUNITIES AND CHALLENGES ON BIG DATA FUTURE INNOVATION, 2017, : 90 - 94
  • [3] Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
    Ashoor, Asmaa Shaker
    Gore, Sharad
    [J]. ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 497 - +
  • [4] A Study on IDS (Intrusion Detection System) and Introduction of IFS (Intrusion Filtration System)
    Dewanjee, Rita
    Vyas, Ranjana
    [J]. COMPUTING AND NETWORK SUSTAINABILITY, 2017, 12 : 119 - 126
  • [5] An intelligent lightweight intrusion detection system(IDS)
    Hu Zheng Bing
    Shirochin, V. P.
    Su Jun
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2202 - 2208
  • [6] An intelligent lightweight intrusion detection system(IDS)
    Hu, ZB
    Shirochin, VP
    Yang, YP
    [J]. Eurocon 2005: The International Conference on Computer as a Tool, Vol 1 and 2 , Proceedings, 2005, : 652 - 655
  • [7] GE-IDS: an intrusion detection system based on grayscale and entropy
    Liao, Dan
    Zhou, Ruijin
    Li, Hui
    Zhang, Ming
    Chen, Xue
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (03) : 1521 - 1534
  • [8] Trans-IDS: A Transformer-Based Intrusion Detection System
    Mercha, El Mahdi
    Chakir, El Mostapha
    Erradi, Mohammed
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 402 - 409
  • [9] GE-IDS: an intrusion detection system based on grayscale and entropy
    Dan Liao
    Ruijin Zhou
    Hui Li
    Ming Zhang
    Xue Chen
    [J]. Peer-to-Peer Networking and Applications, 2022, 15 : 1521 - 1534
  • [10] An evolving intrusion detection system based on natural immune system
    Zhao, JH
    Huang, HK
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 129 - 132