Share This Article:

A Network Intrusion Detection Model Based on Immune Multi-Agent

Abstract Full-Text HTML Download Download as PDF (Size:291KB) PP. 569-574
DOI: 10.4236/ijcns.2009.26063    5,010 Downloads   8,846 Views   Citations


A new network intrusion detection model based on immune multi-agent theory is established and the concept of multi-agents is advanced to realize the logical structure and running mechanism of immune multi-agent as well as multi-level and distributed detection mechanism against network intrusion, using the adaptability, diversity and memory properties of artificial immune algorithm and combing the robustness and distributed character of multi-agents system structure. The experiment results conclude that this system is working pretty well in network security detection.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

N. LIU, S. LIU, R. LI and Y. LIU, "A Network Intrusion Detection Model Based on Immune Multi-Agent," International Journal of Communications, Network and System Sciences, Vol. 2 No. 6, 2009, pp. 569-574. doi: 10.4236/ijcns.2009.26063.


[1] Y. Bai, and H. Kobayashi, “Intrusion detection systems: Technology and development,” IEEE Advanced Information Networking and Applications, pp. 710–715, 2003.
[2] A. Pilz and J. Swoboda, “Network management information models,” Aeu-International Journal of Electronics and Communications, Vol. 58, pp. 165–171, 2004.
[3] Y. L. Dong, J. Qian, M. L. Shi, “A cooperative intrusion detection system based on autonomous agents,” IEEE CCECE 2003, Vol. 2, pp. 861– 863, 2003.
[4] P. D’haeseleer and S. Forrest, “An immunological approach to change detection: Algorithm, analysis and implication,” in Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, pp. 110–119, 1996.
[5] J. Kim and P. Bentley, “The artificial immune model for network intrusion detection,” 7th European Congress on Intelligent Techniques and Soft Computing, 1999.
[6] P. K. Harmer and G. B.Lamont, “An agent based architecture for a computer virus immune system,” Proceedings of the Genetic and Evolutionary Computation Conference, Orlando, Florida, USA, 1999.
[7] F. Esponda, S. Forrest, and P. Helman, “A formal frame work for positive and negative detection schemes,” IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics, Vol. 34, No. 1, pp. 357–373, 2004.
[8] I. M. Hegazy, H. M. Faheem, T. Al-Arif, and T. Ahmed, “Evaluating how well agent-based IDS perform,” Potentials, Digital Object Identifier, IEEE, Vol. 24, 27–30, 2005.
[9] P. Ballet and V. Rodin, “Immune mechanisms to regulate multi-agents systems,” GECCO 2000, Las Vegas, Nevada, USA, July 2000.
[10] Z. Z. Shi, “Intelligent agent and its Application [M],” Science Press, Beijing, 2000.
[11] A Hofmeyr and S. Forrest, “Architecture for an artificial immune system,” Evolutionary Computation, Vol. 7, No. 1, 2000.
[12] N. K. Jerne, “Towards a network theory of the immune system,” Annual Immunology, Vol. 125, 1974.

comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.