Abstract
This paper presents a mathematical model of immune network specified for real-time intrusion detection. A software implementation of the model has been tested on data simulating a typical US Air Force local area network (LAN). The obtained results suggest that the performance of the model is unachievable for other approaches of computational intelligence. A hardware implementation of the model is proposed based on digital signal processor (DSP) of super Harvard architecture (SHARC).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bay, S.D.: The UCI KDD Archive. University of California, Dept. of Information and Computer Science, Irvine (1999) http://kdd.ics.uci.edu
de Boer, R.J., Segel, L.A., Perelson, A.S.: Pattern formation in one and two-dimensional shape space models of the immune system. J. Theoret. Biol. 155, 295–333 (1992)
Buckles, B., Petry, F. (eds.): Genetic Algorithms. IEEE Computer Society Press, Los Alamitos (1992)
de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)
Cloete, I., Zurada, J.M. (eds.): Knowledge-Based Neurocomputing. MIT Press, Cambridge (2000)
Dasgupta, D. (ed.): Artificial Immune Systems and Their Applications. Springer, Berlin (1999)
Fogel, D.B., Robinson, C.J. (eds.): Computational Intelligence: The Experts Speak. IEEE Press, Piscataway (2004)
Forrest, S., Perelson, A., Aleen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: IEEE Symposium on Research in Security and Privacy, Oakland, USA, pp. 202–212 (1994)
Gorman, R.P., Sejnowski, T.J.: Analysis of hidden units in a layered network trained to classify sonar targets. Neural Networks 1, 75–89 (1988)
Hoang, X.D., Hu, J.: New encryption model for secure e-commerce transactions using DSP-host, board and server communication. IEEE Int. Conf. on Telecommunications 1, 166–170 (2002)
Horn, R., Johnson, C.: Matrix Analysis. Cambridge University Press, Cambridge (1986)
Jerne, N.K.: The immune system. Scientific American 229/1, 52–60 (1973)
Jerne, N.K.: Toward a network theory of the immune system. Annals of Immunology 125C, 373–389 (1974)
Melnikov, Y., Tarakanov, A.: Immunocomputing model of intrusion detection. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 453–456. Springer, Heidelberg (2003)
Siegenthaler, T.: Correlation immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inform. Theory 30, 776–780 (1984)
Tarakanov, A.O.: Information security with formal immune networks. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 115–126. Springer, Heidelberg (2001)
Tarakanov, A., Dasgupta, D.: An immunochip architecture and its emulation. In: NASA/DoD Conf. on Evolvable Hardware (EH 2002), Alexandria, USA, pp. 261–265 (2002)
Tarakanov, A., Goncharova, L., Gupalova, T., Kvachev, S., Sukhorukov, A.: Immunocomputing for bioarrays. In: 1st Int. Conf. on Artificial Immune Systems (ICARIS 2002), pp. 32–40. Univ. of Kent at Canterbury, UK (2002)
Tarakanov, A.O., Skormin, V.A., Sokolova, S.P.: Immunocomputing: Principles and Applications. Springer, New York (2003)
Tarakanov, A.O., Tarakanov, Y.A.: A comparison of immune and neural computing for two real-life tasks of pattern recognition. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 236–249. Springer, Heidelberg (2004)
Tarakanov, A.O., Tarakanov, Y.A.: A comparison of immune and genetic algorithms for two real-life tasks of pattern recognition. Int. J. Unconventional Computing 1/3 (2005) (in press)
Zhou, Z.H., Chen, S.: Evolving fault-tolerant neural networks. Neural Computing and Applications 11/3-4, 156–160 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tarakanov, A.O., Kvachev, S.V., Sukhorukov, A.V. (2005). A Formal Immune Network and Its Implementation for On-line Intrusion Detection. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_30
Download citation
DOI: https://doi.org/10.1007/11560326_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29113-8
Online ISBN: 978-3-540-31998-6
eBook Packages: Computer ScienceComputer Science (R0)