Abstract
In this paper we present architecture of recently built experimental anomaly detection system based on the paradigm of artificial immune system and working in a network environment. We show how network traffic data are mapped into antibodies or antigens of artificial immune system and how similarities between signatures of attackers and antibodies are measured. We present an example of the work of the system in the real network environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Dasgupta, F. Gonzales, An Immunity-based Technique to Characterize Intrusions in Computer Networks, IEEE Trans. on Evolutionary Computation, vol. 6,N3, June 2002, pp. 281â291
G. V. Dozier, D. Brown, J. Hurley, C. Cain, Vulnerability Analysis of AIS-Based Intrusion Detection Systems via Genetic and Particle Swarm Red Tearns, in CEC 2004, pp. 111â116
P. K. Harmer, P. D. Wiliams, G. H. Gunsch, G. B. Lamont, An Artificial Immune System Architecture for Computer Security Applications, IEEE Trans. on Evolutionary Computation, vol. 6,N3, June 2002, pp. 252â279
E. Hart, P. Ross, J. Nelson, Producing robust schedules via an artificial immune system, Proc. IEEE Int. Conf. Evolutionary Computing, May 1998, pp. 464â469
S. A. Hofmeyr, S. Forrest, Architecture for an artificial immune system, in IEEE Trans. on Evolutionary Computation, vol. 8,N4, 2000, pp. 443â473
M. Roesch, Snort-Lighweight Intrusion Detection for Networks, in 13th Systems Administration Conference-LISA 99, 1999
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
SeredyĆski, F., Bouvry, P., Rutkowski, D.R. (2005). Anomaly Detection System for Network Security: Immunity-based Approach. In: KĆopotek, M.A., WierzchoĆ, S.T., Trojanowski, K. (eds) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-32392-9_58
Download citation
DOI: https://doi.org/10.1007/3-540-32392-9_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25056-2
Online ISBN: 978-3-540-32392-1
eBook Packages: EngineeringEngineering (R0)