Abstract
One of the most concerning problems faced by practitioners, within the development and operation of IT communication networks, is the crescent number of network intrusion attempts. That kind of attacks compromise the integrity of several services provided through the Internet. This paper presents a technique capable of optimize Danger Theory-based Intrusion Detection Systems through the use of a Genetic Algorithms. To validate the approach, tests were performed on the KDD Cup 1999 database, provided by the University of California Irvine (UCI).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pau, L.-F.: Business and social evaluation of denial of service attacks in view of scaling economic counter-measures. In: 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, pp. 126–133 (2010)
Danziger, M., Lima Neto, F.B.: A hybrid approach for IEEE 802.11 intrusion detection based on AIS, MAS and Nave Bayes. In: International Journal of Computer Information Systems and Industrial Management Applications, vol. 3, pp. 193–201, Pernambuco, Brazil, 2011 (2011)
Matzinger, P.: Tolerance, danger and the extended family. Ann. Rev. Immunol. 12, 991–1045 (1994)
Matzinger, P.: The danger model: a renewed sense of self. Science 296, 301–305 (2002)
Matzinger, P.: The danger model in its historical context. Scand. J. Immunol. 54, 4–9 (2001)
Holland, J.H.: Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Ardor (1975)
Razali, N.M.: Genetic algorithm performance with different selection strategies. In: Solving TSP, Proceedings of the World Congress on Engineering 2011, Vol II, London, UK (2011)
Meng, Q.C.: Genetic Algorithms and Their Application. Publishing Company of Shandong University, Jinan (1995)
Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005). doi:10.1007/11536444_12
KDD Cup 1999 Database. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed Jun 2016
Brownlee, J.: Clever Algorithms: Nature-Inspired Programming Recipes. LuLu, Raleigh (2011)
Srinoy, S., Kurutach, W.: Combination artificial ant clustering and K-PSO clustering approach to network security model. In: International Conference on Hybrid Information Technology (2006)
Srinoy, S.: intrusion detection model based on particle swarm optimization and support vector machine. In: CISDA. IEEE Symposium on Computational Intelligence in Security and Defense Applications, pp. 186–192 (2007)
Somwang, P., Lilakiatsakun, W.: Computer network security based on support vector machine approach. In: 2011 11th International Conference on Control, Automation and Systems, 26–29 October 2011. KINTEX, Gyeonggi-do, Korea, pp. 155–160 (2011)
Zekri, M., Souici-Meslati, L.: Immunological approach for intrusion detection. revue africaine de la recherche en Informatique et Mathématiques Appliquées (ARIMA) 17, 221–240 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Lima Santanelli, J., de Lima Neto, F.B. (2017). Network Intrusion Detection Using Danger Theory and Genetic Algorithms. In: Madureira, A., Abraham, A., Gamboa, D., Novais, P. (eds) Intelligent Systems Design and Applications. ISDA 2016. Advances in Intelligent Systems and Computing, vol 557. Springer, Cham. https://doi.org/10.1007/978-3-319-53480-0_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-53480-0_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53479-4
Online ISBN: 978-3-319-53480-0
eBook Packages: EngineeringEngineering (R0)