An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set

Abstract

With theincreasing worldwide network attacks, intrusion detection (ID) hasbecome a popularresearch topic inlast decade.Several artificial intelligence techniques such as neural networks and fuzzy logichave been applied in ID. The results are varied. Theintrusion detection accuracy is themain focus for intrusion detection systems (IDS). Most research activities in the area aiming to improve the ID accuracy. In this paper, anartificial immune system (AIS) based network intrusion detection scheme is proposed. An optimized feature selection using Rough Set (RS) theory is defined. The complexity issue is addressed in the design of the algorithms. The scheme is tested on the widely used KDD CUP 99 dataset. The result shows that theproposed scheme outperforms other schemes in detection accuracy.

Share and Cite:

J. Shen, J. Wang and H. Ai, "An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set," Communications and Network, Vol. 4 No. 1, 2012, pp. 41-47. doi: 10.4236/cn.2012.41006.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] H.-P. Kriegel, P. Kroger and A. Zimek, “Outlier Detection Techniques (Tutorial),” 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Bangkok, 27-30 April 2009.
[2] N. Cristianini and S. J. Taylor, “An Introduction to Support Vector Machines,” Cambridge University Press, Cambridge, 2000.
[3] J. H. Friedman, “Multivariate Adaptive Regression Splines,” Annals of Statistics, Vol. 19, No. 1, 1991, pp. 1-141. doi:10.1214/aos/1176347963
[4] W. Banzhaf, P. Nordin, E. R. Keller, F. D. Francone, “Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and Its Applications,” Morgan Kaufmann Publishers, Inc., Waltham, 1998.
[5] S. A. Hofmeyr and S. Forrest, “Immunity by Design: An Artificial Immunb System,” Proceedings of the Genetic and Evolutionary Computation Conference, Morgan Kaufmann, San Mateo, 13-17 July 1999, pp. 1289-1296.
[6] J. D. Farmer, N. Packard and A. Perelson, “The Immune System, Adaptation and Machine Learning,” Physica D, Vol. 2, No. 1-3, 1986, pp. 187-204. doi:10.1016/0167-2789(86)90240-X
[7] H. Bersini and F. J. Varela, “Hints for Adaptive Problem Solving Gleaned from Immune Networks,” Parallel Problem Solving from Nature, First Workshop PPSW 1, Dortmund, 1-3 October 1990.
[8] L. N. de Castro and J. Timmis, “Artificial Immune Systems: A New Computational Intelligence Approach,” Springer, Berlin, 2002.
[9] D. Dasgupta, “Immunity-Based Intrusion Detection Systems: A General Framework,” 22nd Nat. Information Systems Security Conference, 2011. http://csrc.nist.gov/nissc/1999/proceedings/papers/p11.pdf
[10] J. D. Farmer, N. H. Packard and A. S. Perelson, “The Immune System, Adaptation, and Machine Learning,” Physica D, Vol. 22, No. 1-3, 1986, pp. 187-204. doi:10.1016/0167-2789(86)90240-X
[11] A. S. Perelson, “Immune Network Theory,” Immunological Reviews, Vol. 110, No. 1, 1989, pp. 5-36. doi:10.1111/j.1600-065X.1989.tb00025.x
[12] F. Varela, A. Coutinho, B. Dupire and N. Vaz, “Cognitive Networks: Immune, Neural and Otherwise,” Theoretical Immunology, Vol. 2, 1988, pp. 359-375.
[13] I. R. Tizard, “Immunology: Introduction,” 4th Edition, Saunders College Publishing, Philadelphia, 1995.
[14] S. A. Hofmeyr and S. Forrest, “Architecture for an Artificial Immune System,” Evolutionary Computation Journal, Vol. 8, No. 4, 2000, pp. 443-473. doi:10.1162/106365600568257
[15] J. Kim and P. Bentley, “The Human Immune System and Network Intrusion Detection,” 7th European Conference on Intelligent Techniques and Soft Computing, Aachen, 1999.
[16] J. Kim and P. J. Bentley, “Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection,” Proceedings of Late-Breaking Papers at the Genetic and Evolutionary Computation Conference, Orlando, 13-17 July 1999, pp. 149-158.
[17] S. Forrest, A. S. Perelson, L. Allen and R. Cherukuri, “Self-Nonself Discrimination in a Computer,” Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1994, pp. 202-212.
[18] S. Hofmeyr and S. Forrest, “Architecture far ao Ariificial Immune System,” Evolutionary Computation, Vol. 7, No. 1, 1999, pp. 45-68.
[19] G. Doziert, D. Brownf, J. Hurley and K. Cainf, “Vulnerability Analysis of AIS-Based Intrusion Detection Systems via Genetic and Particle Swarm Red Teams,” Evolutionary Computation, Vol. 1, 2004, pp. 111-116.
[20] J. W. Kim and P. J. Bentley, “Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator,” Evolutionary Computation, Vol. 2, 2001, pp. 1244-1252.
[21] R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham and M. A. Zissman, “Evaluating Intrusion Detection Systems: The 1998 Darpa Off-Line Intrusion Detection Evaluation,” Discex, Vol. 2, 2000, p. 1012.
[22] A. Zainal, M. A. Maarof and S. M. Shamsuddin, “Feature Selection Using Rough Set in Intrusion Detection,” 2006 IEEE Region 10 Conference, pp. 1-4.
[23] L. Zhang, G. Zhang, L. Yu, J. Zhang and Y. Bai, “Intrusion Detection Using Rough Set Classification,” Journal of Zheijiang University Science, Vol. 5, No. 9, 2004, pp. 1076-1086. doi:10.1631/jzus.2004.1076

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.