A Network Intrusion Detection Model Based on Immune Multi-Agent
Nian LIU, Sunjun LIU, Rui LI, Yong LIU
DOI: 10.4236/ijcns.2009.26063   PDF    HTML     5,678 Downloads   9,998 Views   Citations


A new network intrusion detection model based on immune multi-agent theory is established and the concept of multi-agents is advanced to realize the logical structure and running mechanism of immune multi-agent as well as multi-level and distributed detection mechanism against network intrusion, using the adaptability, diversity and memory properties of artificial immune algorithm and combing the robustness and distributed character of multi-agents system structure. The experiment results conclude that this system is working pretty well in network security detection.

Share and Cite:

N. LIU, S. LIU, R. LI and Y. LIU, "A Network Intrusion Detection Model Based on Immune Multi-Agent," International Journal of Communications, Network and System Sciences, Vol. 2 No. 6, 2009, pp. 569-574. doi: 10.4236/ijcns.2009.26063.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Y. Bai, and H. Kobayashi, “Intrusion detection systems: Technology and development,” IEEE Advanced Information Networking and Applications, pp. 710–715, 2003.
[2] A. Pilz and J. Swoboda, “Network management information models,” Aeu-International Journal of Electronics and Communications, Vol. 58, pp. 165–171, 2004.
[3] Y. L. Dong, J. Qian, M. L. Shi, “A cooperative intrusion detection system based on autonomous agents,” IEEE CCECE 2003, Vol. 2, pp. 861– 863, 2003.
[4] P. D’haeseleer and S. Forrest, “An immunological approach to change detection: Algorithm, analysis and implication,” in Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, pp. 110–119, 1996.
[5] J. Kim and P. Bentley, “The artificial immune model for network intrusion detection,” 7th European Congress on Intelligent Techniques and Soft Computing, 1999.
[6] P. K. Harmer and G. B.Lamont, “An agent based architecture for a computer virus immune system,” Proceedings of the Genetic and Evolutionary Computation Conference, Orlando, Florida, USA, 1999.
[7] F. Esponda, S. Forrest, and P. Helman, “A formal frame work for positive and negative detection schemes,” IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics, Vol. 34, No. 1, pp. 357–373, 2004.
[8] I. M. Hegazy, H. M. Faheem, T. Al-Arif, and T. Ahmed, “Evaluating how well agent-based IDS perform,” Potentials, Digital Object Identifier, IEEE, Vol. 24, 27–30, 2005.
[9] P. Ballet and V. Rodin, “Immune mechanisms to regulate multi-agents systems,” GECCO 2000, Las Vegas, Nevada, USA, July 2000.
[10] Z. Z. Shi, “Intelligent agent and its Application [M],” Science Press, Beijing, 2000.
[11] A Hofmeyr and S. Forrest, “Architecture for an artificial immune system,” Evolutionary Computation, Vol. 7, No. 1, 2000.
[12] N. K. Jerne, “Towards a network theory of the immune system,” Annual Immunology, Vol. 125, 1974.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.