iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/11599371_7
A New Model for Dynamic Intrusion Detection | SpringerLink
Skip to main content

A New Model for Dynamic Intrusion Detection

  • Conference paper
Cryptology and Network Security (CANS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3810))

Included in the following conference series:

Abstract

Building on the concepts and the formal definitions of self, nonself, antigen, and detector introduced in the research of network intrusion detection, the dynamic evolution models and the corresponding recursive equations of self, antigen, immune-tolerance, lifecycle of mature detectors, and immune memory are presented. Following that, an immune-based model, referred to as AIBM, for dynamic intrusion detection is developed. Simulation results show that the proposed model has several desirable features including self-learning, self-adaption and diversity, thus providing a effective solution for network intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Li, T.: An Introduction to Computer Network Security. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  2. Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  3. De Castro, L.N., Timmis, J.I.: Artificial immune systems as a novel soft computing paradigm. Soft Computing Journal 7(8), 526–544 (2003)

    Google Scholar 

  4. Spears, W.M., De Jong, K.A.: An overview of evolutionary computation. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol. 667, pp. 442–459. Springer, Heidelberg (1993)

    Google Scholar 

  5. De Castro, L.N., Timmis, J.I.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  6. Bradley, D.W., Tyrrell, A.M.: A hardware immune system for benchmark state machine error detection. In: Proc. of the Conf. on Evolutionary Computation, Honolulu, pp. 813–818 (2002)

    Google Scholar 

  7. Tyrrell, A.M.: Computer know thy self: a biological way to look at fault-tolerance. In: Second Euromicro/IEEE Workshop on Dependable Computing Systems, Milan, Italy, pp. 129–135 (1999)

    Google Scholar 

  8. Forrest, S., Perelson, A.S.: Self-nonself discrimination in a computer. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, pp. 202–213 (1994)

    Google Scholar 

  9. Forrest, S., Hofmeyr, S., Somayaji, A.: Computer immunology. Communications of the ACM 40(10), 88–96 (1997)

    Article  Google Scholar 

  10. Hofmeyr, S., Forrest, S.: Immunity by design: an artificial immune system. In: Proc. of the Genetic Evolutionary Computation Conf., San Francisco, CA, pp. 1289–1296 (1999)

    Google Scholar 

  11. Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation 8(4), 443–473 (2000)

    Article  Google Scholar 

  12. Dasgupta, D.: Immunity-based intrusion detection system: a general framework. In: Proc. of the 22nd National Information Systems Security Conf., Crystal City, pp. 147–160 (1999)

    Google Scholar 

  13. Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An artificial immune system architecture for computer security applications. IEEE Trans. on Evolutionary Computation 6(3), 252–280 (2002)

    Article  Google Scholar 

  14. D’haeseleer, P., Forrest, S.: An immunological approach to change detection: algorithm, analysis and implication. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, pp. 110–119 (1996)

    Google Scholar 

  15. Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Proc. of the Conf. on Evolutionary Computation, Honolulu, pp. 1015–1020 (2002)

    Google Scholar 

  16. Perelson, A.S., Weisbuch, G.: Immunology for physicists. Review of Modern Physics 69(4), 1219–1263 (1997)

    Article  Google Scholar 

  17. Li, T.: An immunity based network security risk estimation. Science in China Ser. F Information Sciences 48(5), 798–816 (2005)

    Google Scholar 

  18. Li, T.: An immune based dynamic intrusion detection model. Chinese Science Bulletin 50(17) (2005)

    Google Scholar 

  19. Li, T.: A new model of immune-based network surveillance and dynamic computer forensics. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, vol. 3611, pp. 799–808. Springer, Heidelberg (2005)

    Google Scholar 

  20. Timmis, J., Bentley, P.J.: Negative selection: how to generate detectors. In: Proc. of the 1st International Conf. on Artificial Immune Systems, pp. 89–98. University of Kent at Canterbury (2002)

    Google Scholar 

  21. Haeseleer, P.D., Forrest, S., et al.: An immunological approach to change detection. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, CA (1996)

    Google Scholar 

  22. Somayaji, A., Hofmeyr, S., Forrest, S.: Principles of a computer immune system. In: Proc. of the New Security Paradigms Workshop, Langdale, United Kingdom, pp. 75–82 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, T., Liu, X., Li, H. (2005). A New Model for Dynamic Intrusion Detection. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_7

Download citation

  • DOI: https://doi.org/10.1007/11599371_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30849-2

  • Online ISBN: 978-3-540-32298-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics