Filters








1,418 Hits in 7.6 sec

Immune System based Intrusion Detection System (IS-IDS): A Proposed

Inadyuti Dutt, Samarjeet Borah, Indra Kanta Maitra
2020 IEEE Access  
INDEX TERMS Computer networks, computer security, intrusion detection, immune system, anomaly detection, network, T-cell, B-cell, innate immune system, adaptive immune system.  ...  The main objective of the paper is to monitor, log the network traffic and apply detection algorithms for detecting intrusions within the network.  ...  Immune-inspired network security has become popular due to its marked resemblance with the natural Immune System (IS). A.  ... 
doi:10.1109/access.2020.2973608 fatcat:3ekfffkhibcsjgzi2enxufbeyi

An efficient quantum multiverse optimization algorithm for solving optimization problems

Samira Sarvari, Nor Fazlida Mohd. Sani, Zurina Mohd Hanapi, Mohd Taufik Abdullah
2020 International Journal of Advances in Applied Sciences  
Detecting unknown or modified attacks is one of the recent challenges in the field of intrusion detection system (IDS).  ...  It is demonstrated 99.98% accuracy with experimental results that the proposed QMVO is significantly improved optimization compared with multiverse optimizer (MVO) algorithms.</p>  ...  The experimental results in Figure 2 provides an evaluation of the performance of the ANN intrusion detection for the QMVO algorithm with 97.48 DR, 0.03 FAR, and 99.98 ACC.  ... 
doi:10.11591/ijaas.v9.i1.pp27-33 fatcat:rlnny5fwirhf5nftac47wcpg4q

A Survey of Artificial Immune System Based Intrusion Detection

Hua Yang, Tao Li, Xinlei Hu, Feng Wang, Yang Zou
2014 The Scientific World Journal  
In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions.  ...  There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques.  ...  Additionally, the famous immune network model aiNet [56] also uses CLONALG with added network interactions.  ... 
doi:10.1155/2014/156790 pmid:24790549 pmcid:PMC3981469 fatcat:by6vbjmeuvfd3knmcutp3cemze

A New Classification Scheme for Intrusion Detection Systems

Bilal Maqbool Beigh
2014 International Journal of Computer Network and Information Security  
In order to save our data from these attacks, the researchers had implemented a concept called intrusion detection system, with the help of detection technology the users can prevent their critical data  ...  As we know that there are lots of intrusion detection system in market which are either open source and some of them are commercial.  ...  Network Based intrusion detection system. 3. Hybrid intrusion detection system.  ... 
doi:10.5815/ijcnis.2014.08.08 fatcat:fwd3f6z7jvebjaguszznjxsbhi

Multiple Immune-based Approaches for Network Traffic Analysis

Inadyuti Dutt, Samarjeet Borah, Indra Kanta Maitra
2020 Procedia Computer Science  
Then the selected features are supplied to the various immune-based algorithms for detecting anomalies in the network.  ...  Then the selected features are supplied to the various immune-based algorithms for detecting anomalies in the network.  ...  Experimental Setup Raw Network Data Preparation The network is capable of transmitting huge amount of data which are used as datasets for intrusion detection and further analysis.  ... 
doi:10.1016/j.procs.2020.03.259 fatcat:gupfhkkj5jhrnkho53qexogfsu

A Comprehensive Survey of Technologies for Building a Hybrid High Performance Intrusion Detection System

S. J.SathishAaronJoseph, R.Balasubramanian R.Balasubramanian
2015 International Journal of Computer Applications  
Intrusion detection plays a vital role in maintaining the stability of any network.  ...  The major requirements for any intrusion detection system are speed, accuracy and less memory.Though various intrusion detection methods are available, they excel at some points while lack in the others  ...  The current trend in intrusion detection is to combine bothhost based and network based information to develop hybrid systems [30] .  ... 
doi:10.5120/19904-2015 fatcat:d5sbwg2iozfk3niiz2izq3tlzq

Intrusion Detection and Security Mechanisms for Wireless Sensor Networks

S. Khan, Jaime Lloret, Jonathan Loo
2014 International Journal of Distributed Sensor Networks  
In the paper "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks, " a critical study on genetic algorithm, artificial immune, and artificial neural network  ...  classification of network and detection of system intrusion attempts is presented.  ...  In the paper "Intrusion detection systems based on artificial intelligence techniques in wireless sensor networks, " a critical study on genetic algorithm, artificial immune, and artificial neural network  ... 
doi:10.1155/2014/747483 fatcat:vjdr7bpajzbjbmrea2zkirgbty

A machine learning framework of neural network combined with PLS regression and artificial immune system for intrusion detection
IJARCCE - Computer and Communication Engineering

G.V.PRADEEP KUMAR, D.KRISHNA REDDY
2014 IJARCCE  
In this paper we use Artificial Immune System mark the signatures as genes. A packet or network level signature is verified for closeness with existing model.  ...  Further we investigate the real time applicability of the technique by using PLS Regression to detect anomaly in CIT college router dataset.  ...  Biological systems are used as inspiration for bio inspired computing. Artificial immune systems are such bio inspired computing which has contributed for complex problem solutions.  ... 
doi:10.17148/ijarcce.2014.31226 fatcat:oupz6icypbazhoofu5mlohxkvy

Anomaly based Intrusion Detection using Modified Fuzzy Clustering

B.S. Harish, S.V.A. Kumar
2017 International Journal of Interactive Multimedia and Artificial Intelligence  
Khazaee and Faez [18] developed an hybrid classification method for network intrusion detection. This hybrid model combines fuzzy clustering with multilayer perceptron neural network.  ...  Thus, inspired by the good performance presented in [2] , we applied RSKFCM method to detect network anomalies.  ... 
doi:10.9781/ijimai.2017.05.002 fatcat:cbapttn5wzeqrkhuljzic6ci6a

A Meta-analytic Review of Intelligent Intrusion Detection Techniques in Cloud Computing Environment

Meghana G Raj, Santosh Kumar Pani
2021 International Journal of Advanced Computer Science and Applications  
Intrusion Detection Systems (IDS) are used to detect malicious attacks and reinstate network security in the cloud environment.  ...  This study concludes that IDS based on Hybrid Meta-Heuristic Algorithms have increased Accuracy, decreased False Positivity Rate and increased Detection Rate.  ...  to be further explored.Lastly, the offline IDS process needs to be extended to real time intrusion detection.  ... 
doi:10.14569/ijacsa.2021.0121023 fatcat:qhfu7drkbnestjmzrdx6nk47zu

Feature Selection Algorithms in Intrusion Detection System: A Survey

2018 KSII Transactions on Internet and Information Systems  
Regarding to the huge number of connections and the large flow of data on the Internet, Intrusion Detection System (IDS) has a difficulty to detect attacks.  ...  In this paper, we introduce a survey of feature selection algorithms for intrusion detection system. We describe the well-known approaches that have been proposed in FS for IDS.  ...  MIDS is defined like an adoption of multiple technologies (hybrid techniques). Further, Wireless Sensor Networks (WSNs) intrusion detection is considered as a part of WIDS.  ... 
doi:10.3837/tiis.2018.10.024 fatcat:c4erbjt2v5dv5l2gbihrmr575q

Collaborative Cloud IDS in Detecting Denial of Service by Dendritic Cell Mechanism

Azuan Ahmad, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Malaysia, Mohd Nazri Kama, Azri Azmi, Norbik Bashah Idris
2019 International Journal of Electrical and Electronic Engineering & Telecommunications  
We conclude the paper with a discussion on the results, then we include together with a graphical summary of the experiment's result.  Index Terms-cloud computing, information security, artificial immune  ...  system, intrusion detection, dendritic cell, denial of service  ...  The monitoring host was installed with Network-based Intrusion Detection System (NIDS) and in a mirror mode where all network traffic for other cloud host will be mirrored towards monitoring host.  ... 
doi:10.18178/ijeetc.8.4.188-193 fatcat:ag24zpa73rcpjm4ik5a4j4x2iy

Immune System Approaches to Intrusion Detection - A Review

Uwe Aickelin, Julie Greensmith, Jamie Twycross
2004 Social Science Research Network  
Keywords artificial immune systems, intrusion detection systems, literature review  ...  The use of artificial immune systems in intrusion detection is an appealing concept for two reasons.  ...  Acknowledgements This project is supported by the EPSRC (GR/S47809/01), Hewlett-Packard Labs, Bristol, and the Firestorm intrusion detection system team.  ... 
doi:10.2139/ssrn.2832021 fatcat:qk5mobqfvnh5xeu4nr6fknsn2y

Immune system approaches to intrusion detection – a review

Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross
2007 Natural Computing  
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons.  ...  It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge.  ...  Acknowledgements This project is supported by the EPSRC (GR/S47809/01), Hewlett-Packard Labs, Bristol, and the Firestorm intrusion detection system team.  ... 
doi:10.1007/s11047-006-9026-4 fatcat:7c42al33pngytggqmwiakbbb3q

Immune System Approaches to Intrusion Detection – A Review [chapter]

Uwe Aickelin, Julie Greensmith, Jamie Twycross
2004 Lecture Notes in Computer Science  
Keywords artificial immune systems, intrusion detection systems, literature review  ...  The use of artificial immune systems in intrusion detection is an appealing concept for two reasons.  ...  Acknowledgements This project is supported by the EPSRC (GR/S47809/01), Hewlett-Packard Labs, Bristol, and the Firestorm intrusion detection system team.  ... 
doi:10.1007/978-3-540-30220-9_26 fatcat:vb3e2bzaybcyjbdf4h2wszj3dy
« Previous Showing results 1 — 15 out of 1,418 results