Immune System Based Intrusion Detection System (IS-IDS): A Proposed

被引:23
|
作者
Dutt, Inadyuti [1 ]
Borah, Samarjeet [1 ]
Maitra, Indra Kanta [2 ]
机构
[1] Sikkim Manipal Univ, Sikkim Manipal Inst Technol, Dept Comp Applicat, Majhitar 737136, India
[2] St Xaviers Univ, Controller Examinat Dept, Kolkata 700160, India
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Immune system; Intrusion detection; Pathogens; Adaptive systems; Telecommunication traffic; Anomaly detection; Payloads; Computer networks; computer security; intrusion detection; immune system; anomaly detection; network; T-cell; B-cell; innate immune system; adaptive immune system; FEATURES;
D O I
10.1109/ACCESS.2020.2973608
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores the immunological model and implements it in the domain of intrusion detection on computer networks. The main objective of the paper is to monitor, log the network traffic and apply detection algorithms for detecting intrusions within the network. The proposed model mimics the natural Immune System (IS) by considering both of its layers, innate immune system and adaptive immune system respectively. The current work proposes Statistical Modeling based Anomaly Detection (SMAD) as the first layer of Intrusion Detection System (IDS). It works as the Innate Immune System (IIS) interface and captures the initial traffic of a network to find out the first-hand vulnerability. The second layer, Adaptive Immune-based Anomaly Detection (AIAD) has been considered for determining the features of the suspicious network packets for detection of anomaly. It imitates the adaptive immune system by taking into consideration the activation of the T-cells and the B-cells. It captures relevant features from header and payload portions for effective detection of intrusion. Experiments have been conducted on both the real-time network traffic and the standard datasets KDD99 and UNSW-NB15 for intrusion detection. The SMAD model yields as high as 96.04%true positive rate and around 97% true positive rate using real-time traffic and standard data sets. Highly suspicious traffic detected in the SMAD model is further tested for vulnerability in the AIAD model. Results show significant true positive rate, closer to almost 99% of accurately detecting the file-based and user-based anomalies for both the real-time traffic and standard data sets.
引用
下载
收藏
页码:34929 / 34941
页数:13
相关论文
共 50 条
  • [21] Detection using Intrusion Detection System (IDS) and SMS Gateway Controller
    Arhami, Muhammad
    Arianda, Akhbar
    Fata, Akmalul
    Yassir
    Desiani, Anita
    Arifai, Muhammad
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2023, 70 (02) : 449 - 453
  • [22] Commercial and open-source based Intrusion Detection System and Intrusion Prevention System (IDS/IPS) design for an IP networks
    Hock, Filip
    Kortis, Peter
    2015 13TH INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA), 2015, : 99 - 102
  • [23] Optimizing an IDS (Intrusion Detection System) by Means of Advanced Metaheuristics
    Mora, A. M.
    Arenas, M. G.
    Romero-Horno, A.
    Camacho-Paez, J.
    Castillo, P. A.
    ADVANCES IN COMPUTATIONAL INTELLIGENCE, IWANN 2023, PT I, 2023, 14134 : 55 - 67
  • [24] A systematic literature review for network intrusion detection system (IDS)
    Abdulganiyu, Oluwadamilare Harazeem
    Tchakoucht, Taha Ait
    Saheed, Yakub Kayode
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1125 - 1162
  • [25] A systematic literature review for network intrusion detection system (IDS)
    Oluwadamilare Harazeem Abdulganiyu
    Taha Ait Tchakoucht
    Yakub Kayode Saheed
    International Journal of Information Security, 2023, 22 : 1125 - 1162
  • [26] Exploiting Machine Learning Technique for Attack Detection in Intrusion Detection System (IDS) Based on Protocol
    Aladesote, Olomi Isaiah
    Fakoya, Johnson Tunde
    Agbelusi, Olutola
    ADVANCES IN INFORMATION SYSTEMS, ARTIFICIAL INTELLIGENCE AND KNOWLEDGE MANAGEMENT, ICIKS 2023, 2024, 486 : 158 - 167
  • [27] MA_IDS : Mobile Agents for Intrusion Detection System
    Barika, F. A.
    El Kadhi, N.
    Ghedira, K.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 900 - +
  • [28] Review on the development and future trend of the intrusion detection system (IDS)
    Sun, Tingyang
    Zhang, Jiahao
    Yang, Yumeng
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 1000 - 1005
  • [29] Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach
    Jabez, J.
    Muthukumar, B.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 338 - 346
  • [30] Intrusion Detection System with Snort in Cloud Computing: Advanced IDS
    Mishra, Vikas
    Vijay, Vinay Kumar
    Tazi, Satyanaryan
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 457 - 465