Skip to main content

Immune Clonal Selection Wavelet Network Based Intrusion Detection

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3696))

Abstract

The ICSA (Immune Clonal Selection Algorithm) based structure and parameter learning of wavelet network for intrusion detection is proposed. The hierarchical structure is used in the coding scheme, thus we can realize evolution of topologic structure and the parameter learning of the wavelet network meanwhile. The experimental results show that the method based on ICSA can get higher true rate of IDS (Intrusion Detection System) than advanced wavelet network and Immune wavelet network. At the same time, the method proposed can reduce the false rate of IDS and has faster convergence speed in experiment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schaffer, J.D., Whitley, D., Eshelman, L.J.: Combinations of Genetic Algorithms and Neural Networks: A Survey of the State of the Art. In: Int. Workshop on Combinations of Genetic Algorithms and Neural Networks(COGANN 1992), Los Alamitos, pp. 1–37 (1992)

    Google Scholar 

  2. Mak, M.W., Cho., K.W.: Genetic Evolution of Radial Basis Function Centers for Pattern Classification. In: The proceedings of 1998 IEEE Int. Joint Conf. on Neural Networks (IJCNN 1998), Anchorage, vol. 1, pp. 669–673 (1998)

    Google Scholar 

  3. Yao, X.: Evolving Artificial Neural Networks. Proceedings of the IEEE 87, 1423–1447 (1999)

    Article  Google Scholar 

  4. de Lacerda, E.G.M., de Carvalho, A.C.P.L.F., Ludermir, T.B.: Evolutionary Optimization of RBF Networks. In: Proceedings of Sixth Brazilian Symposium on Neural Networks, pp. 219–224 (2000)

    Google Scholar 

  5. Hofmann., A., Sick., B.: Evolutionary Optimization of Radial Basis Function Networks for Intrusion Detection. In: Proceedings of the International Joint Conference on Neural Networks, pp. 20–24 (2003)

    Google Scholar 

  6. Wang, L.N., Yu, G., Wang, G.R., Wang, D.: Method of Evolutionary Neural Network-Based Intrusion Detection. In: Proceedings of International Conferences on Info-tech and Info-net, Beijing, vol. 5, pp. 13–18 (2001)

    Google Scholar 

  7. Wang, L., Pan, J., Jiao, L.C.: The Immune Algorithm. Acta Electronica Sinica 28, 74–78 (2000)

    Google Scholar 

  8. Zhang, Q.H., Benveniste, A.: Wavelet Networks. IEEE Transactions on Neural Networks 3, 889–898 (1992)

    Article  Google Scholar 

  9. Jiao, L.C., Du, H.F., et al: The Prospect of the Artificial Immune System. Acta Electronica Sinica 31, 1540–1548 (2003) (in Chinese)

    Google Scholar 

  10. Du, H.F., Jiao, L.C., Wang, S.A.: Clonal Operator and Antibody Clone Algorithms. In: Proceedings of the 2002 International Conference on Machine Learning and Cybernetics, Beijing, pp. 506–510 (2002)

    Google Scholar 

  11. Zheng, P.E., Ma, Y.H.: A New Hierarchical Genetic Algorithm for Training of RBF Neural Networks. Control and Decision 15, 165–168 (2000) (in Chinese)

    Google Scholar 

  12. Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. In: Gong, L., Reiter, M.K. (eds.) Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133–145. IEEE Computer Society Press, Oakland (1999)

    Google Scholar 

  13. Lee, W., Stolfo, S.J.: Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. PhD thesis. Columbia University (1999)

    Google Scholar 

  14. Liu, F., Luo, L.: Adaptive Immune Wavelet Network based Intrusion Detection. Pattern Recognition and Artificial Intelligence (to appear) (2005) (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, F., Luo, L. (2005). Immune Clonal Selection Wavelet Network Based Intrusion Detection. In: Duch, W., Kacprzyk, J., Oja, E., Zadrożny, S. (eds) Artificial Neural Networks: Biological Inspirations – ICANN 2005. ICANN 2005. Lecture Notes in Computer Science, vol 3696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11550822_52

Download citation

  • DOI: https://doi.org/10.1007/11550822_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28752-0

  • Online ISBN: 978-3-540-28754-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics