Design and Implementation of an Immune Algorithm for IDS

被引:0
|
作者
Yao Xing [1 ]
Lu Jiaxing [1 ]
Guo Fan [1 ]
Yu Min [1 ]
机构
[1] JiangXi Normal Univ, Dept Informat & Engn, Nanchang City 330022, Peoples R China
关键词
immune algorithm; negative selection; clonal selection; r-bit consecutive match;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
According to immune principle, this paper designs an immune algorithm applied to intrusion detection system. The algorithm mainly includes negative selection algorithm, clonal selection algorithm and r-bit consecutive matching algorithm. In order to reduce the number of inevitable "black hole", this paper used r-bit variable matching algorithm, and used a method of fast training data set to shorten the training time of data, The experimental results showed that the algorithm is an effective immune algorithm.
引用
收藏
页码:1054 / 1059
页数:6
相关论文
共 50 条
  • [1] A SCHEME FOR THE DESIGN AND IMPLEMENTATION OF A DISTRIBUTED IDS
    Chandradeep, K. B.
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 265 - 270
  • [2] The design and implementation of session-based IDS
    Mizutani, M
    Shirahata, S
    Minami, M
    Murai, J
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS, 2006, 89 (03): : 46 - 58
  • [3] Feature Selection and Implementation of IDS using Boosting algorithm
    Shrivastava, Utpal
    Sharma, Neelam
    2020 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2020), 2020, : 853 - 858
  • [4] Analysis, design and implementation of IDS using data mining
    Patel, B. V.
    Meshram, B. B.
    WEBIST 2008: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2008, : 81 - +
  • [5] Design and Implementation of A Distributed IDS Alert Aggregation Model
    Guo Fan
    Ye Jihua
    Yu Min
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 975 - 980
  • [6] The Design and Implementation of the IDS Catalogue Data Archive System
    Li Jingang
    Liu Shibin
    Liu Wei
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 837 - 844
  • [7] Implementation of IDS for Web Application Attack using Evolutionary Algorithm
    Khan, Saba
    Motwani, Dilip
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [8] A Network IDS Model Based on Improved Artificial Immune Algorithm
    Tang, Hong
    2016 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2017, : 46 - 50
  • [9] Design and implementation of detection engine against IDS evasion with unicode
    Kang, DH
    Oh, JT
    Kim, KY
    Jang, JS
    CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 333 - 337
  • [10] Design and implementation of a new CIDF_based IDS system
    Fang, ZY
    Liu, Z
    Zhai, YJ
    Pang, JX
    Wang, XH
    Xuan, JQ
    Li, YH
    Ll, X
    Proceedings of the Second IASTED International Multi-Conference on Automation, Control, and Information Technology - Communication Systems, 2005, : 129 - 133