Skip to main content
Log in

An immunity-based technique to detect network intrusions

  • Computer & Information Science
  • Published:
Journal of Zhejiang University-SCIENCE A Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest’s negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • DARPA, 1999. Intrusion Detection Evaluation. http://www.ll. mit.edu/IST/ideval/index.html.

  • Dasgupta, D., Gonzalez, F., 2002. An immunity-based technique to characterize intrusions in computer networks.IEEE Trans on Evolutionary Computation,6(3):281–291.

    Article  Google Scholar 

  • de Castro, L.N., Von Zuben, F.J., 1999. Artificial Immune Systems: Part I-Basic Theory and Applications. Technical Report-RT DCA 01/99, FEEC/Univ. Campinas, Campinas, Brazil. http://www.dca.fee.unicamp.br/~lnunes/immune.html.

  • Denning, D., 1987. An intrusion-detection model.IEEE Trans. Software Eng.,13:222–232.

    Article  Google Scholar 

  • D’haeseleer, P., Forrest, S., Helman, P., 1996. An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.

    Google Scholar 

  • Forrest, S., Perelson, A., Allen, L., Cherukuri, R., 1994. Self-Nonself Discrimination in A Computer. Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, p. 202–212.

  • Forrest, S., Hofmeyr, S.A., Somayaji, A., 1996. A Sense of self for UNIX Processes. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.

    Book  Google Scholar 

  • Forrest, S., Hofmeyr, S., Somayaji, A., 1997, Computer immunology.Communications of the ACM,40(10):88–96.

    Article  Google Scholar 

  • Harmer, P.K., Williams, P.O., Gunsch, G.H., Lamont, G.B., 2002. An artificial immune system architecture for computer security applications.IEEE Transactions on Evolutionary Computation,6(3):252–280.

    Article  Google Scholar 

  • Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjec, B., Wood, J., Wolber, D., 1990. A Network Security Monitor. Proceedings of the IEEE Symposium on Security and Privacy, IEEE Press.

  • Hofmeyr, S.A., 1999. An Immunological Model of Distributed Detection and Its Application to Computer Security, Ph. D. Dissertation, University of New Mexico.

  • Hunt, J.E., Cooke, D.E., 1996. Learning using an artificial immune system.Journal of Network and Computer Applications, p. 189–212.

  • Kim, J., Bentley, P.J., 2001. Evaluating Negative Selection in An Artificial Immune System for Network Intrusion Detection. Genetic and Evolutionary Computation Conference 2001 (GECCO-2001), San Francisco, p. 1330–1337.

  • Perelson, A.S., Weisbuch, G., 1997. Immunology for Physicists.Rev. of Modern Physics,69(4):1219–1265.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Feng, P., Yun-fei, D. & Wei-nong, W. An immunity-based technique to detect network intrusions. J. Zheijang Univ.-Sci. A 6, 371–377 (2005). https://doi.org/10.1631/jzus.2005.A0371

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/jzus.2005.A0371

Key Words

Document code

CLC number

Navigation