计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 43-47.doi: 10.11896/j.issn.1002-137X.2014.12.010

• 第十届中国信息和通信安全学术会议 • 上一篇    下一篇

基于复合免疫算法的入侵检测系统

冯翔,马美怡,赵天玲,虞慧群   

  1. 华东理工大学信息科学与工程学院 上海200237;华东理工大学信息科学与工程学院 上海200237;华东理工大学信息科学与工程学院 上海200237;华东理工大学信息科学与工程学院 上海200237
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(60905043,7,61173048),上海市教育委员会科研创新项目,中央高校基本科研业务费资助

Intrusion Detection System Based on Hybrid Immune Algorithm

FENG Xiang,MA Mei-yi,ZHAO Tian-ling and YU Hui-qun   

  • Online:2018-11-14 Published:2018-11-14

摘要: 计算机安全系统与生物免疫系统具有很多的相似性,它们都需要在不断变化的环境中维持自身的稳定性。提出复合免疫算法,并应用到入侵检测系统中,以保护网络安全。针对经典的人工免疫算法在性能上存在的缺陷进行了改进,完善了其核心算法——否定选择算法,在否定选择算法中加入了分段技术和关键位,避免了恒定的匹配概率导致的匹配漏洞,降低了系统漏检率。并将遗传算法中的克隆选择算法和改进的否定选择算法结合为复合免疫算法,提高了检测器生成的动态性和多样性。最后,通过数学理论分析与仿真实验模拟,验证了改进算法的有效性和可行性,并且与其它经典算法进行了比较,结果证明,改进算法可以提高系统性能。

关键词: 人工免疫算法,入侵检测,否定选择算法,生物免疫系统,克隆选择算法

Abstract: Computer security system and biological immune system have much comparability,so the artificial immune algorithm can be applied in intrusion detection system to solve various problems in the field of computer security.After studying the classical algorithm named negative selection algorithm,it was discovered that the matching algorithm would cause the examination black hole.A novel hybrid immune algorithm was proposed to solve the intrusion detection problem.The effectiveness and feasibility of the improved algorithm were verified.This paper partitioned the match string and set different coefficient for each section,thus to eliminate the problem that the r-continual position match algorithm has the constant match probability in the reverse choice algorithm,and to reduce the missing rate of intrusion detection system.This paper also combined the negative selection algorithm with the clonal selection algorithm.This will increase the reproduction,selection and intersection into the produce of detection.Thus the missing rate will be reduced.At last,we compared and analyzed the different parameters,including the section number,threshold value and r-continual parameter.

Key words: Artificial immune,Intrusion detection,Negative selection algorithm,Biological immune system,Clonal selection algorithm

[1] anonymity.NET NEWS:Policing the Computer Underworld[J].Science,1998,282(11):1223-1224
[2] El-Khatib K.Impact of feature reduction on the efficiency ofwireless intrusion detection systems[J].IEEE Transactions on Parallel and Distributed Systems,2010,21(8):1143-1149
[3] Wang Y,Fu W,Agrawal D.Gaussian Versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2013(2):342-355
[4] 方贤进,李龙澍,钱海.基于人工免疫的网络入侵检测中疫苗算子的作用研究 [J].计算机科学,2010,37(1):239-242
[5] 黄建忠,裴灿浩,谢长生,等.一种基于人工免疫技术的存储异常检测系统[J].计算机科学,2010,37(1):42-46
[6] Zhang Y,Wang L,Sun W,et al.Distributed intrusion detection system in a multi-layer network architecture of smart grids[J].IEEE Transactions on Smart Grid,2011,2(4):796-808
[7] Ou C M.Host-based intrusion detection systems adapted from agent-based artificial immune systems[J].Neurocomputing,2012(7):78-86
[8] Wu S X,Banzhaf W.The use of computational intelligence in intrusion detection systems:A review[J].Applied Soft Computing,2010,10(1):1-35 (下转第77页)(上接第47页)
[9] Timmins J,Hone A,Stibor T,et al.Theoretical advances in artificial immune systems[J].Theoretical Computer Science,2008,3:11-32
[10] Yang J,Liu X J,Li T,et al.Distrubited agents model for intrusion detection based on AIS [J].Knowledge-Based Systems,2009,22:115-119
[11] Sobh T S,Mostafa W M.A cooperative immunological approach for detecting network anomaly [J].Applied Soft Computing,2011,11:1275-1283
[12] Powers S T,He J.A hybrid artificial immune system and self organising map for network intrusion detection [J].Information Sciences,2008,178:3024-3042
[13] Meisel M,Pappas V,Zhang L.A taxonomy of biologically inspired research in computer networking [J].Computer Networks,2010,54:901-916
[14] Visconti A,Tahayori H.Artificial immune system based on interval type-2 fuzzy set paradigm [J].Applied Soft Computing,2011,11:4055-4063
[15] Tsai C F,Hsu Y F,Lin C Y,et al.Intrusion detection by machine learning:a review [J].Expert Systems with Applications,2009(36):11994-12000

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!