Skip to main content

Anomaly Detection System for Network Security: Immunity-based Approach

  • Conference paper
Intelligent Information Processing and Web Mining

Part of the book series: Advances in Soft Computing ((AINSC,volume 31))

Abstract

In this paper we present architecture of recently built experimental anomaly detection system based on the paradigm of artificial immune system and working in a network environment. We show how network traffic data are mapped into antibodies or antigens of artificial immune system and how similarities between signatures of attackers and antibodies are measured. We present an example of the work of the system in the real network environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Dasgupta, F. Gonzales, An Immunity-based Technique to Characterize Intrusions in Computer Networks, IEEE Trans. on Evolutionary Computation, vol. 6,N3, June 2002, pp. 281–291

    Article  Google Scholar 

  2. G. V. Dozier, D. Brown, J. Hurley, C. Cain, Vulnerability Analysis of AIS-Based Intrusion Detection Systems via Genetic and Particle Swarm Red Tearns, in CEC 2004, pp. 111–116

    Google Scholar 

  3. P. K. Harmer, P. D. Wiliams, G. H. Gunsch, G. B. Lamont, An Artificial Immune System Architecture for Computer Security Applications, IEEE Trans. on Evolutionary Computation, vol. 6,N3, June 2002, pp. 252–279

    Article  Google Scholar 

  4. E. Hart, P. Ross, J. Nelson, Producing robust schedules via an artificial immune system, Proc. IEEE Int. Conf. Evolutionary Computing, May 1998, pp. 464–469

    Google Scholar 

  5. S. A. Hofmeyr, S. Forrest, Architecture for an artificial immune system, in IEEE Trans. on Evolutionary Computation, vol. 8,N4, 2000, pp. 443–473

    Article  Google Scholar 

  6. M. Roesch, Snort-Lighweight Intrusion Detection for Networks, in 13th Systems Administration Conference-LISA 99, 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

SeredyƄski, F., Bouvry, P., Rutkowski, D.R. (2005). Anomaly Detection System for Network Security: Immunity-based Approach. In: KƂopotek, M.A., WierzchoƄ, S.T., Trojanowski, K. (eds) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-32392-9_58

Download citation

  • DOI: https://doi.org/10.1007/3-540-32392-9_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25056-2

  • Online ISBN: 978-3-540-32392-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics