Abstract
Building on the concepts and the formal definitions of self, nonself, antigen, and detector introduced in the research of network intrusion detection, the dynamic evolution models and the corresponding recursive equations of self, antigen, immune-tolerance, lifecycle of mature detectors, and immune memory are presented. Following that, an immune-based model, referred to as AIBM, for dynamic intrusion detection is developed. Simulation results show that the proposed model has several desirable features including self-learning, self-adaption and diversity, thus providing a effective solution for network intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Li, T.: An Introduction to Computer Network Security. Publishing House of Electronics Industry, Beijing (2004)
Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)
De Castro, L.N., Timmis, J.I.: Artificial immune systems as a novel soft computing paradigm. Soft Computing Journal 7(8), 526–544 (2003)
Spears, W.M., De Jong, K.A.: An overview of evolutionary computation. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667, pp. 442–459. Springer, Heidelberg (1993)
De Castro, L.N., Timmis, J.I.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)
Bradley, D.W., Tyrrell, A.M.: A hardware immune system for benchmark state machine error detection. In: Proc. of the Conf. on Evolutionary Computation, Honolulu, pp. 813–818 (2002)
Tyrrell, A.M.: Computer know thy self: a biological way to look at fault-tolerance. In: Second Euromicro/IEEE Workshop on Dependable Computing Systems, Milan, Italy, pp. 129–135 (1999)
Forrest, S., Perelson, A.S.: Self-nonself discrimination in a computer. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, pp. 202–213 (1994)
Forrest, S., Hofmeyr, S., Somayaji, A.: Computer immunology. Communications of the ACM 40(10), 88–96 (1997)
Hofmeyr, S., Forrest, S.: Immunity by design: an artificial immune system. In: Proc. of the Genetic Evolutionary Computation Conf., San Francisco, CA, pp. 1289–1296 (1999)
Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8(4), 443–473 (2000)
Dasgupta, D.: Immunity-based intrusion detection system: a general framework. In: Proc. of the 22nd National Information Systems Security Conf., Crystal City, pp. 147–160 (1999)
Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An artificial immune system architecture for computer security applications. IEEE Trans. on Evolutionary Computation 6(3), 252–280 (2002)
D’haeseleer, P., Forrest, S.: An immunological approach to change detection: algorithm, analysis and implication. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, pp. 110–119 (1996)
Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Proc. of the Conf. on Evolutionary Computation, Honolulu, pp. 1015–1020 (2002)
Perelson, A.S., Weisbuch, G.: Immunology for physicists. Review of Modern Physics 69(4), 1219–1263 (1997)
Li, T.: An immunity based network security risk estimation. Science in China Ser. F Information Sciences 48(5), 798–816 (2005)
Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin 50(17) (2005)
Li, T.: A new model of immune-based network surveillance and dynamic computer forensics. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, vol. 3611, pp. 799–808. Springer, Heidelberg (2005)
Timmis, J., Bentley, P.J.: Negative selection: how to generate detectors. In: Proc. of the 1st International Conf. on Artificial Immune Systems, pp. 89–98. University of Kent at Canterbury (2002)
Haeseleer, P.D., Forrest, S., et al.: An immunological approach to change detection. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, CA (1996)
Somayaji, A., Hofmeyr, S., Forrest, S.: Principles of a computer immune system. In: Proc. of the New Security Paradigms Workshop, Langdale, United Kingdom, pp. 75–82 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, T., Liu, X., Li, H. (2005). A New Model for Dynamic Intrusion Detection. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_7
Download citation
DOI: https://doi.org/10.1007/11599371_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30849-2
Online ISBN: 978-3-540-32298-6
eBook Packages: Computer ScienceComputer Science (R0)