Skip to main content

A Formal Immune Network and Its Implementation for On-line Intrusion Detection

  • Conference paper
Computer Network Security (MMM-ACNS 2005)

Abstract

This paper presents a mathematical model of immune network specified for real-time intrusion detection. A software implementation of the model has been tested on data simulating a typical US Air Force local area network (LAN). The obtained results suggest that the performance of the model is unachievable for other approaches of computational intelligence. A hardware implementation of the model is proposed based on digital signal processor (DSP) of super Harvard architecture (SHARC).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bay, S.D.: The UCI KDD Archive. University of California, Dept. of Information and Computer Science, Irvine (1999) http://kdd.ics.uci.edu

  2. de Boer, R.J., Segel, L.A., Perelson, A.S.: Pattern formation in one and two-dimensional shape space models of the immune system. J. Theoret. Biol. 155, 295–333 (1992)

    Article  Google Scholar 

  3. Buckles, B., Petry, F. (eds.): Genetic Algorithms. IEEE Computer Society Press, Los Alamitos (1992)

    Google Scholar 

  4. de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)

    MATH  Google Scholar 

  5. Cloete, I., Zurada, J.M. (eds.): Knowledge-Based Neurocomputing. MIT Press, Cambridge (2000)

    Google Scholar 

  6. Dasgupta, D. (ed.): Artificial Immune Systems and Their Applications. Springer, Berlin (1999)

    MATH  Google Scholar 

  7. Fogel, D.B., Robinson, C.J. (eds.): Computational Intelligence: The Experts Speak. IEEE Press, Piscataway (2004)

    Google Scholar 

  8. Forrest, S., Perelson, A., Aleen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: IEEE Symposium on Research in Security and Privacy, Oakland, USA, pp. 202–212 (1994)

    Google Scholar 

  9. Gorman, R.P., Sejnowski, T.J.: Analysis of hidden units in a layered network trained to classify sonar targets. Neural Networks 1, 75–89 (1988)

    Article  Google Scholar 

  10. Hoang, X.D., Hu, J.: New encryption model for secure e-commerce transactions using DSP-host, board and server communication. IEEE Int. Conf. on Telecommunications 1, 166–170 (2002)

    Google Scholar 

  11. Horn, R., Johnson, C.: Matrix Analysis. Cambridge University Press, Cambridge (1986)

    Google Scholar 

  12. Jerne, N.K.: The immune system. Scientific American 229/1, 52–60 (1973)

    Google Scholar 

  13. Jerne, N.K.: Toward a network theory of the immune system. Annals of Immunology 125C, 373–389 (1974)

    Google Scholar 

  14. Melnikov, Y., Tarakanov, A.: Immunocomputing model of intrusion detection. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 453–456. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Siegenthaler, T.: Correlation immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inform. Theory 30, 776–780 (1984)

    Article  MATH  MathSciNet  Google Scholar 

  16. Tarakanov, A.O.: Information security with formal immune networks. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 115–126. Springer, Heidelberg (2001)

    Google Scholar 

  17. Tarakanov, A., Dasgupta, D.: An immunochip architecture and its emulation. In: NASA/DoD Conf. on Evolvable Hardware (EH 2002), Alexandria, USA, pp. 261–265 (2002)

    Google Scholar 

  18. Tarakanov, A., Goncharova, L., Gupalova, T., Kvachev, S., Sukhorukov, A.: Immunocomputing for bioarrays. In: 1st Int. Conf. on Artificial Immune Systems (ICARIS 2002), pp. 32–40. Univ. of Kent at Canterbury, UK (2002)

    Google Scholar 

  19. Tarakanov, A.O., Skormin, V.A., Sokolova, S.P.: Immunocomputing: Principles and Applications. Springer, New York (2003)

    MATH  Google Scholar 

  20. Tarakanov, A.O., Tarakanov, Y.A.: A comparison of immune and neural computing for two real-life tasks of pattern recognition. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 236–249. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Tarakanov, A.O., Tarakanov, Y.A.: A comparison of immune and genetic algorithms for two real-life tasks of pattern recognition. Int. J. Unconventional Computing 1/3 (2005) (in press)

    Google Scholar 

  22. Zhou, Z.H., Chen, S.: Evolving fault-tolerant neural networks. Neural Computing and Applications 11/3-4, 156–160 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tarakanov, A.O., Kvachev, S.V., Sukhorukov, A.V. (2005). A Formal Immune Network and Its Implementation for On-line Intrusion Detection. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_30

Download citation

  • DOI: https://doi.org/10.1007/11560326_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29113-8

  • Online ISBN: 978-3-540-31998-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics