NIDS research based on artificial immunology

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Current network intrusion detection systems are of low intelligence level and have the main deficiency as being unable to detect new intrusive behaviors of unknown signatures. The protection mechanism of natural immune system has brought us inspirations to design a novel network intrusion detection system. The research on modeling a NIDS with natural immune system just started, including the negative selection algorithm proposed by S. Forrest and the basic system model proposed by J. Kim. Based on their works, this paper proposed a novel system structure including affinity mutation, which was used to improve the performance of anomaly detection, and established an basic system based on artificial immunology. This paper stressed on the novel construction and testing experiments. Result of the experiments proved that the application of the protection mechanism of natural immune system to network intrusion detection system has an exciting perspective.

Original languageEnglish
Title of host publicationInformation and Communications Security - 3rd International Conference, ICICS 2001, Proceedings
EditorsSihan Qing, Tatsuaki Okamoto, Jianying Zhou
PublisherSpringer Verlag
Pages371-375
Number of pages5
ISBN (Print)3540428801, 9783540428800
DOIs
StatePublished - 2001
Externally publishedYes
Event3rd International Conference on Information and Communications Security, ICICS 2001 - Xian, China
Duration: 13 Nov 200116 Nov 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2229
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Information and Communications Security, ICICS 2001
Country/TerritoryChina
CityXian
Period13/11/0116/11/01

Fingerprint

Dive into the research topics of 'NIDS research based on artificial immunology'. Together they form a unique fingerprint.

Cite this