Detection of DDoS Attacks via an Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm

被引:0
|
作者
Akyazi, Ugur [1 ]
Uyar, A. Sima [2 ]
机构
[1] Turkish Air Force Acad, Dept Comp Engn, TR-34149 Istanbul, Turkey
[2] Istanbul Tech Univ, Dept Comp Engn, Istanbul 34469, Turkey
关键词
Intrusion Detection; Distributed Denial of Service Attack; DARPA LLDOS Dataset; Artificial Immune System; Multiobjective Evolutionary Algorithm;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Distributed Denial of Service Attack is a coordinated attack on the availability of services of a victim system, launched indirectly through many compromised computers. Intrusion detection systems (IDS) are network security tools that process local audit data or monitor network traffic to search for specific patterns or certain deviations from expected behavior. We use an Artificial Immune System (AIS) as a method of anomaly-based IDS because of the similarity between the IDS architecture and the Biological Immune Systems. We improved the jREMISA study; a Multiobjective Evolutionary Algorithm inspired AIS, in order to get better true and false positive rates while detecting DDoS attacks on the MIT DARPA LLDOS 1.0 dataset. We added the method of r-continuous evaluations, changed the Negative Selection and Clonal Selection structure, and redefined the objectives while keeping the general concepts the same. The 100% true positive rate and 0% false positive rate of our approach, under the given parameter settings and experimental conditions, shows that it is very successful as an anomaly-based IDS for DDoS attacks.
引用
收藏
页码:1 / +
页数:2
相关论文
共 50 条
  • [1] An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions
    Haag, Charles R.
    Lamont, Gary B.
    Williams, Paul D.
    Peterson, Gilbert L.
    ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS, 2007, 4628 : 420 - +
  • [2] ARTIFICIAL IMMUNE SYSTEM-INSPIRED NEUROEVOLUTION
    Neukart, Florian
    Moraru, Sorin-Aurel
    Szakacs Simon, Peter
    ANNALS OF DAAAM FOR 2012 & PROCEEDINGS OF THE 23RD INTERNATIONAL DAAAM SYMPOSIUM - INTELLIGENT MANUFACTURING AND AUTOMATION - FOCUS ON SUSTAINABILITY, 2012, 23 : 133 - 138
  • [3] An immune system-inspired paradigm for anomaly detection
    Peng, Lingxi
    Li, Tao
    Liu, Xiaojie
    Chen, Yuefeng
    Liu, Caiming
    Liu, Sunjun
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2007, 4 (7-8) : 1394 - 1398
  • [4] An immune system-inspired rescheduling algorithm for workflow in Cloud systems
    Yao, Guangshun
    Ding, Yongsheng
    Ren, Lihong
    Hao, Kuangrong
    Chen, Lei
    KNOWLEDGE-BASED SYSTEMS, 2016, 99 : 39 - 50
  • [5] An Immune System-Inspired Reconfigurable Controller
    Ding, Yongsheng
    Xu, Nan
    Dai, Shengfang
    Ren, Lihong
    Hao, Kuangrong
    Huang, Biao
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2016, 24 (05) : 1875 - 1882
  • [6] An Immune System-Inspired Information Diffusion Model
    Liu, Yanjun
    Ding, Yongsheng
    Hao, Kuangrong
    Chen, Lei
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 11238 - 11243
  • [7] Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm
    Aziz, Amira Sayed A.
    Salama, Mostafa A.
    Hassanien, Aboul Ella
    Hanafi, Sanaa El-Ola
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (04): : 347 - 357
  • [8] Multiobjective optimization by a modified artificial immune system algorithm
    Freschi, F
    Repetto, M
    ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS, 2005, 3627 : 248 - 261
  • [9] Convergence analysis of a multiobjective artificial immune system algorithm
    Villalobos-Arias, M
    Coello, CAC
    Hernández-Lerma, O
    ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS, 2004, 3239 : 226 - 235
  • [10] IMMUNE SYSTEM-INSPIRED DYNAMIC MULTI-ROBOT COORDINATION
    Khan, Muhammad Tahir
    de Silva, Clarence
    PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, VOL 3, 2010, : 37 - 43