| Literature DB >> 24790549 |
Hua Yang1, Tao Li2, Xinlei Hu2, Feng Wang2, Yang Zou2.
Abstract
In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.Entities:
Mesh:
Year: 2014 PMID: 24790549 PMCID: PMC3981469 DOI: 10.1155/2014/156790
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Figure 1The framework for AIS based IDS design.
Figure 2LISYS encoding of a TCP SYN packet [20].
Figure 3The DynamiCS gene representation [21].
Figure 4Real-value representation.
Figure 5The NSA. Randomly generate candidate detectors (represented by dark circle); if they match any self (i.e., if any of the points covered by the detector are in the self-set), they are eliminated and regenerated until getting enough valid detectors [20].
Time and space complexities of all detector generating algorithms [48].
| Algorithm | Time | Space |
|---|---|---|
| Exhaustive |
|
|
| Linear |
|
|
| Greedy |
|
|
| NSMutation |
|
|
Figure 6The lifecycle of a detector [20].
Figure 7Dynamical real-time anomaly detection with immune NS [22].