scholarly journals Network intrusion detection by the coevolutionary immune algorithm of artificial immune systems with clonal selection

Author(s):  
T Salamatova ◽  
V Zhukov
2011 ◽  
Vol 361-363 ◽  
pp. 687-690 ◽  
Author(s):  
Xin Xiao ◽  
Rui Rui Zhang

For the existing artificial immune systems applied to network intrusion detection have some shortages, an improved network intrusion detection model based on the dynamic clone selection algorithm which was put forward by Kim is proposed. The model introduces the concept of self group, which is obtained by the clustering algorithm AiNet and represents common features of normal data. The self group deals with network data before they are tested by detectors. In addition, the model adopts a design of distributed network intrusion detection, and a central server manages all the immune cells, receives vaccines and vaccinats the whole network detection hosts. Experimental results show that the number of selves and detectors are reduced, the process of affinity maturation for the detector population is speeded up, and the model achieves higher detection rate and lower false positive rate with the evolution generation increases.


2006 ◽  
Vol 48 (3) ◽  
Author(s):  
Thomas Stibor ◽  
Claudia Eckert ◽  
Jonathan Timmis

SummaryThe immune system is an impressive information processing system with many appealing properties for solving problems. Artificial immune systems are a paradigm inspired by the immune system and are used for solving computational and information processing problems. In this paper, we outline two different immune-inspired approaches typically used for IT-security problems. Specifically, we present one of the first proposed immune inspired approaches for network intrusion detection, this is then complimented with an overview of recent investigations on the latest immunological theories and how they may be exploited in IT-security. We then present an artificial immune system concept for database security which encompasses issues such as confidentiality of database information and prevention of privacy-preserving data mining.


2012 ◽  
Vol 2012 ◽  
pp. 1-20 ◽  
Author(s):  
Erik Cuevas ◽  
Valentin Osuna-Enciso ◽  
Daniel Zaldivar ◽  
Marco Pérez-Cisneros ◽  
Humberto Sossa

Bio-inspired computing has lately demonstrated its usefulness with remarkable contributions to shape detection, optimization, and classification in pattern recognition. Similarly, multithreshold selection has become a critical step for image analysis and computer vision sparking considerable efforts to design an optimal multi-threshold estimator. This paper presents an algorithm for multi-threshold segmentation which is based on the artificial immune systems(AIS) technique, also known as theclonal selection algorithm (CSA). It follows the clonal selection principle (CSP) from the human immune system which basically generates a response according to the relationship between antigens (Ag), that is, patterns to be recognized and antibodies (Ab), that is, possible solutions. In our approach, the 1D histogram of one image is approximated through a Gaussian mixture model whose parameters are calculated through CSA. Each Gaussian function represents a pixel class and therefore a thresholding point. Unlike the expectation-maximization (EM) algorithm, the CSA-based method shows a fast convergence and a low sensitivity to initial conditions. Remarkably, it also improves complex time-consuming computations commonly required by gradient-based methods. Experimental evidence demonstrates a successful automatic multi-threshold selection based on CSA, comparing its performance to the aforementioned well-known algorithms.


2005 ◽  
Vol 13 (2) ◽  
pp. 145-177 ◽  
Author(s):  
Simon M. Garrett

The field of Artificial Immune Systems (AIS) concerns the study and development of computationally interesting abstractions of the immune system. This survey tracks the development of AIS since its inception, and then attempts to make an assessment of its usefulness, defined in terms of ‘distinctiveness’ and ‘effectiveness.’ In this paper, the standard types of AIS are examined—Negative Selection, Clonal Selection and Immune Networks—as well as a new breed of AIS, based on the immunological ‘danger theory.’ The paper concludes that all types of AIS largely satisfy the criteria outlined for being useful, but only two types of AIS satisfy both criteria with any certainty.


Sign in / Sign up

Export Citation Format

Share Document