Multi-level immunity-based intrusion detection and risk evaluation model

被引:0
|
作者
Liu, Caiming [1 ]
Li, Tao [1 ]
Peng, Lingxi [1 ]
Zeng, Jinquan [1 ]
Zhao, Hui [1 ]
Lu, Zhengtian [1 ]
机构
[1] Sichuan Univ, Sch Comp Sci, Chengdu 610065, Peoples R China
关键词
biological immune system; intrusion detection; risk estimation; immune detector; finger print library;
D O I
10.1166/jctn.2007.022
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A multi-level immunity-based distributed intrusion detection and risk evaluation model is presented. To improve the ability of network environment adaptation, intrusion detection systems are deployed in detection hosts and disposed concentratedly by a central detection server. An immune detector simulates immunocytes in a biological immune system and its evolutionary process simulates an advancement mechanism of antibodies. A second-level immune detector set mechanism that may improve local detection ability is proposed. The central detection server receives vaccines and vaccinates detection hosts. It globally detects unknown attacks. Network risk is computed at different levels to totalize the attack risk of the whole network. To decrease alarm information flood, finger print information library and alarm classification are proposed. Simulation experiments show that the proposed model has the ability to advance the network environment adaptation performance of intrusion detection host, decrease alarm flood and false alarm rate, and provide a new way to evaluate the risk of network and host in quantity.
引用
收藏
页码:1344 / 1350
页数:7
相关论文
共 50 条
  • [1] A model of immunity-based network intrusion detection
    Sun, ZX
    Mao, ZX
    Gong, J
    Xu, HX
    Wang, RC
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 417 - 420
  • [2] An immunity-based model for network intrusion detection
    Zhang, YC
    Que, XR
    Wang, WD
    Cheng, SD
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E24 - E29
  • [3] An immunity-based model for dynamic distributed intrusion detection
    Qiao, Peili
    Wang, Tong
    Su, Jie
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
  • [4] An intelligent immunity-based model for distributed intrusion detection
    Peng, Z. (pengzhihao@neusoft.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (08):
  • [5] A new immunity-based model for network intrusion detection
    Li, RF
    Wang, C
    Tu, XY
    2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 106 - 109
  • [6] Immunity-Based Intrusion Detection for Wireless Sensor Networks
    Liu, Yang
    Yu, Fengqi
    2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 439 - 444
  • [7] An immunity-based dynamic multilayer intrusion detection system
    Liang, Gang
    Li, Tao
    Ni, Jiancheng
    Jiang, Yaping
    Yang, Jin
    Gong, Xun
    COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS, PT 3, PROCEEDINGS, 2006, 4115 : 641 - 650
  • [8] An immunity-based intrusion detection solution for database systems
    Chen, K
    Chen, G
    Dong, JX
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 773 - 778
  • [9] Intrusion detection alert verification based on multi-level fuzzy comprehensive evaluation
    Mu, CP
    Huang, HK
    Tian, SF
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 2005, 3801 : 9 - 16
  • [10] Immunity-based clonal selection algorithm for intrusion detection systems
    Wu, Zejun
    Qian, Lijin
    Liang, Yiwen
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (06):