We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Article:Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm

by Muna Elsadig Mohamed, Brahim Belhaouari Samir, Azween Abdullah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 7
Year of Publication: 2010
Authors: Muna Elsadig Mohamed, Brahim Belhaouari Samir, Azween Abdullah
10.5120/1693-2217

Muna Elsadig Mohamed, Brahim Belhaouari Samir, Azween Abdullah . Article:Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm. International Journal of Computer Applications. 12, 7 ( December 2010), 7-12. DOI=10.5120/1693-2217

@article{ 10.5120/1693-2217,
author = { Muna Elsadig Mohamed, Brahim Belhaouari Samir, Azween Abdullah },
title = { Article:Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 7 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number7/1693-2217/ },
doi = { 10.5120/1693-2217 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:00.778802+05:30
%A Muna Elsadig Mohamed
%A Brahim Belhaouari Samir
%A Azween Abdullah
%T Article:Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 7
%P 7-12
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. Classification techniques using k-nearest neighbor (k-NN) or Gaussian Mixture (GMM) almost have the common sense that they believe the neighboring data. The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts.

References
  1. A. Somayaji, S. Hofmeyr, and S. Forrest, “Principles of a computer immune system,” proc of the 1997 workshop on New security paradigms - NSPW ’97, 1997, pp. 75-82.
  2. S.M. Garrett, “How do we evaluate artificial immune systems?,” Evolutionary computation, vol. 13, Jan. 2005, pp. 145-77.
  3. J. Twycross and U. Aickelin, “Biological Inspiration for Artificial Immune Systems,” vol. 4628, 2010, p. 12.
  4. J. Kim, P.J. Bentley, U. Aickelin, J. Greensmith, G. Tedesco, and J. Twycross, “Immune system approaches to intrusion detection – a review,” Natural Computing, vol. 6, Jan. 2007, pp. 413-466.
  5. S. Forrest, S.A. Hofmeyr, and A. Somayaji, “Computer immunology,” Communications of the ACM, vol. 40, 1997, pp. 88-96.]
  6. J. Kim and P. Bentley, “The Human Immune System and Network Intrusion Detection,” proc of the 7th European Conf on Intelligent Techniques and Soft Computing EUFIT99, 1999.
  7. U. Aickelin and S. Cayzer, “The Danger Theory and Its Application to AIS,” proc of the First International Conf on Artificial Immune Systems ICARIS2002, 2002, pp. 141-148.
  8. U. Aickelin and J. Greensmith, “Sensing danger: Innate I immunology for intrusion detection,” Information Security Technical Report, vol. 12, 2007, pp. 218-227.
  9. A. Krizhanovsky and A. Marasanov, “An Approach for Adaptive Intrusion Prevention Based on The Danger,” The Second International Conf on Availability, Reliability and Security (ARES’07), Apr. 2007, pp. 1135-1142.
  10. J. Greensmith, U. Aickelin, and S. Cayzer, “Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection,” Artificial Immune Systems, 2005, p. 153–167.
  11. M. Elsadig, A. Abdullah, and B.B. Samir, “Immune Multi Agent System for Intrusion Prevention and Self-Healing System Implement a Non-Linear Classification,” (ITSim), IntSymp in , vol.3, no., pp.1-6, 15-17 June 2010.
  12. V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Computing Surveys, vol. 41, 2009, pp. 1-58.
  13. K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems ( IDPS ) Recommendations of the National Institute of Standards and Technology,” Nist Special Publication.
  14. Duda, R. O., Hart, P. E., and Stork, D. G. Pattern Classification 2nd Edition. Wiley- Interscience, 2000.
  15. E. Eskin, “Anomaly Detection over Noisy Data using Learned Probability Distributions,” Proc of the 25th Int Conf on Machine learning, Morgan Kaufmann, San Francisco, CA, 2000, pp. 255-262.
  16. K. Chan, M.V. Mahoney, and M.H. Arshad, “A Machine Learning Approach to Anomaly Detection,” Tech. Rep. CS-003 06, Department of Computer Science, Florida Institute of Technology Melbourne FL 32901, 2003, pp. 1-13.
  17. B.VDasarstly, Ed.,”Nearest Neighbor (NN) Norms: NN Pattern classification techniques”, osAlamitos,AC:IEEE computer Socity press 1990.
  18. D.M.Titterington, A.F.M. Smith, and U.E.Mako,”statistical analysis of finite mixture distriburions.”, John Wiley,NewYork,1985.
  19. KDD CUP 99 Data Sethttp://www.sigkdd.org/kddcup/index.php?section =1999&method=info
  20. H.G. Kayacik, A.N. Zincir-Heywood, and M.I. Heywood, “Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets,” Dalhousie University, Faculty of Computer Science, 2005, pp. 3-8.
  21. S. Liu, T. Li, D. Wang, X. Hu, and C. Xu, “Multi-agent network intrusion active defense model based on immune theory,” Wuhan University Journal of Natural Sciences, vol. 12, Jan. 2007, pp. 167-171.
Index Terms

Computer Science
Information Sciences

Keywords

Artificial immune system classification Intrusion detection system