A survey of intrusion detection techniques based on negative selection algorithm

被引:4
|
作者
Singh, Kuldeep [1 ]
Kaur, Lakhwinder [1 ]
Maini, Raman [1 ]
机构
[1] Punjabi Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Artificial immune system; Security; Negative selection algorithm; Intrusion detection; IMMUNE-SYSTEM; ANOMALY DETECTION; OPTIMIZATION; AIS;
D O I
10.1007/s13198-021-01357-8
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Artificial Immune System (AIS) is a powerful information processing system in adaptability, distribution, self-regulation, and decentralization control in computer networks inspired by the human immune system (HIS). NSA is the primary method used in AIS. It is based on self and non-self-discrimination observed in the HIS. This work introduces the recent improvements in the NSA in the field of Intrusion detection in computer networks, wireless sensor networks (WSN), Internet of things (IoT) and aircraft system. The literature shows that most of the authors have used the NSL-KDD dataset to evaluate the performance of their proposed work, Euclidean distance as similarity measure, info gain and principal component analysis (PCA) as dimensionality reduction algorithm.
引用
收藏
页码:175 / 185
页数:11
相关论文
共 50 条
  • [41] Towards accurate intrusion detection based on improved clonal selection algorithm
    Chunyong Yin
    Luyu Ma
    Lu Feng
    [J]. Multimedia Tools and Applications, 2017, 76 : 19397 - 19410
  • [42] An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection
    Shen, Yanping
    Zheng, Kangfeng
    Wu, Chunhua
    Zhang, Mingwu
    Niu, Xinxin
    Yang, Yixian
    [J]. COMPUTER JOURNAL, 2018, 61 (04): : 526 - 538
  • [43] A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection
    Zhao, Fei
    Zhao, Jiyong
    Niu, Xinxin
    Luo, Shoushan
    Xin, Yang
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (09):
  • [44] Genetic Algorithm based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks
    Kannan, Anand
    Maguire, Gerald Q.
    Sharma, Ayush
    Schoo, Peter
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012), 2012, : 416 - 423
  • [45] Survey of Genetic Algorithm Effectiveness in Intrusion Detection
    Gnanaprasanambikai, L.
    Munusamy, Nagarajan
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [46] Intrusion Detection systems using Real-Valued Negative Selection Algorithm with Optimized Detectors
    Selahshoor, Fatemeh
    Jazayeriy, Hamid
    Omranpour, Hesam
    [J]. 2019 5TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS 2019), 2019,
  • [47] Network intrusion detection system: A survey on artificial intelligence-based techniques
    Habeeb, Mohammed Sayeeduddin
    Babu, T. Ranga
    [J]. EXPERT SYSTEMS, 2022, 39 (09)
  • [48] A Comparative Study of Feature Selection Techniques for Intrusion Detection
    Kaur, Rajveer
    Kumar, Gulshan
    Kumar, Krishan
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 2120 - 2124
  • [49] Survey of intrusion detection systems: techniques, datasets and challenges
    Ansam Khraisat
    Iqbal Gondal
    Peter Vamplew
    Joarder Kamruzzaman
    [J]. Cybersecurity, 2
  • [50] Survey of intrusion detection systems: techniques, datasets and challenges
    Khraisat, Ansam
    Gondal, Iqbal
    Vamplew, Peter
    Kamruzzaman, Joarder
    [J]. CYBERSECURITY, 2019, 2 (01)