Multi-level immunity-based intrusion detection and risk evaluation model

被引:0
|
作者
Liu, Caiming [1 ]
Li, Tao [1 ]
Peng, Lingxi [1 ]
Zeng, Jinquan [1 ]
Zhao, Hui [1 ]
Lu, Zhengtian [1 ]
机构
[1] Sichuan Univ, Sch Comp Sci, Chengdu 610065, Peoples R China
关键词
biological immune system; intrusion detection; risk estimation; immune detector; finger print library;
D O I
10.1166/jctn.2007.022
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A multi-level immunity-based distributed intrusion detection and risk evaluation model is presented. To improve the ability of network environment adaptation, intrusion detection systems are deployed in detection hosts and disposed concentratedly by a central detection server. An immune detector simulates immunocytes in a biological immune system and its evolutionary process simulates an advancement mechanism of antibodies. A second-level immune detector set mechanism that may improve local detection ability is proposed. The central detection server receives vaccines and vaccinates detection hosts. It globally detects unknown attacks. Network risk is computed at different levels to totalize the attack risk of the whole network. To decrease alarm information flood, finger print information library and alarm classification are proposed. Simulation experiments show that the proposed model has the ability to advance the network environment adaptation performance of intrusion detection host, decrease alarm flood and false alarm rate, and provide a new way to evaluate the risk of network and host in quantity.
引用
收藏
页码:1344 / 1350
页数:7
相关论文
共 50 条
  • [31] Optimization of Real-Valued Self Set in Immunity-based WSN Intrusion Detection
    Guo, Weipeng
    Chen, Yonghong
    Wang, Tian
    Tian, Hui
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND ENGINEERING APPLICATIONS, 2016, 63 : 120 - 127
  • [32] Multi-level alert clustering for intrusion detection sensor data
    Siraj, A
    Vaughn, RB
    NAFIPS 2005 - 2005 Annual Meeting of the North American Fuzzy Information Processing Society, 2005, : 748 - 753
  • [33] Unified, Multi-level Intrusion Detection in Private Cloud Infrastructures
    Humphrey, Marty
    Emerson, Robert
    Beekwilder, Norm
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 11 - 15
  • [34] A multi-level intrusion detection method for abnormal network behaviors
    Ji, Soo-Yeon
    Jeong, Bong-Keun
    Choi, Seonho
    Jeong, Dong Hyun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 : 9 - 17
  • [35] Warning Model of Financial Risk Based on the Multi-level Fuzzy Comprehensive Evaluation Method
    Song Xiaozhong
    Jiang Ming
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INNOVATION & MANAGEMENT, VOLS I AND II, 2008, : 751 - 755
  • [36] Research of immunity-based anomaly intrusion detection and its application for security evaluation of E-government affair systems
    Sun, Feixian
    Guo, Gaiwen
    International Journal of Digital Content Technology and its Applications, 2012, 6 (20) : 429 - 437
  • [37] Multi-level Distributed Intrusion Detection System for an IoT based Smart Home Environment
    Facchini, Simone
    Giorgi, Giacomo
    Saracino, Andrea
    Dini, Gianluca
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 705 - 712
  • [38] An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks
    Butun, Ismail
    Ra, In-Ho
    Sankar, Ravi
    SENSORS, 2015, 15 (11) : 28960 - 28978
  • [39] A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory
    Alaparthy, Vishwa Teja
    Morgera, Salvatore Domenic
    IEEE ACCESS, 2018, 6 : 47364 - 47373
  • [40] Consumers Team Detection Model Based on Trust for Multi-Level
    Li, Xiaoming
    Xu, Guangquan
    Armoogum, Sandhya
    Gao, Honghao
    MOBILE INFORMATION SYSTEMS, 2019, 2019