Skip to main content

Network Intrusion Detection Using Danger Theory and Genetic Algorithms

  • Conference paper
  • First Online:
Intelligent Systems Design and Applications (ISDA 2016)

Abstract

One of the most concerning problems faced by practitioners, within the development and operation of IT communication networks, is the crescent number of network intrusion attempts. That kind of attacks compromise the integrity of several services provided through the Internet. This paper presents a technique capable of optimize Danger Theory-based Intrusion Detection Systems through the use of a Genetic Algorithms. To validate the approach, tests were performed on the KDD Cup 1999 database, provided by the University of California Irvine (UCI).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Pau, L.-F.: Business and social evaluation of denial of service attacks in view of scaling economic counter-measures. In: 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, pp. 126–133 (2010)

    Google Scholar 

  2. Danziger, M., Lima Neto, F.B.: A hybrid approach for IEEE 802.11 intrusion detection based on AIS, MAS and Nave Bayes. In: International Journal of Computer Information Systems and Industrial Management Applications, vol. 3, pp. 193–201, Pernambuco, Brazil, 2011 (2011)

    Google Scholar 

  3. Matzinger, P.: Tolerance, danger and the extended family. Ann. Rev. Immunol. 12, 991–1045 (1994)

    Article  Google Scholar 

  4. Matzinger, P.: The danger model: a renewed sense of self. Science 296, 301–305 (2002)

    Article  Google Scholar 

  5. Matzinger, P.: The danger model in its historical context. Scand. J. Immunol. 54, 4–9 (2001)

    Article  Google Scholar 

  6. Holland, J.H.: Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Ardor (1975)

    Google Scholar 

  7. Razali, N.M.: Genetic algorithm performance with different selection strategies. In: Solving TSP, Proceedings of the World Congress on Engineering 2011, Vol II, London, UK (2011)

    Google Scholar 

  8. Meng, Q.C.: Genetic Algorithms and Their Application. Publishing Company of Shandong University, Jinan (1995)

    Google Scholar 

  9. Greensmith, J., Aickelin, U., Cayzer, S.: Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 153–167. Springer, Heidelberg (2005). doi:10.1007/11536444_12

    Chapter  Google Scholar 

  10. KDD Cup 1999 Database. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed Jun 2016

  11. Brownlee, J.: Clever Algorithms: Nature-Inspired Programming Recipes. LuLu, Raleigh (2011)

    Google Scholar 

  12. Srinoy, S., Kurutach, W.: Combination artificial ant clustering and K-PSO clustering approach to network security model. In: International Conference on Hybrid Information Technology (2006)

    Google Scholar 

  13. Srinoy, S.: intrusion detection model based on particle swarm optimization and support vector machine. In: CISDA. IEEE Symposium on Computational Intelligence in Security and Defense Applications, pp. 186–192 (2007)

    Google Scholar 

  14. Somwang, P., Lilakiatsakun, W.: Computer network security based on support vector machine approach. In: 2011 11th International Conference on Control, Automation and Systems, 26–29 October 2011. KINTEX, Gyeonggi-do, Korea, pp. 155–160 (2011)

    Google Scholar 

  15. Zekri, M., Souici-Meslati, L.: Immunological approach for intrusion detection. revue africaine de la recherche en Informatique et Mathématiques Appliquées (ARIMA) 17, 221–240 (2014)

    Google Scholar 

Download references

Acknowledgements

Thanks to Computer Engineering Program of School of Engineering of University of Pernambuco and the Brazilian Army which made this research possible.

Thanks to Moisés Danziger, whose work [2, 3] and inspiration were seminal for the present study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to João Lima Santanelli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lima Santanelli, J., de Lima Neto, F.B. (2017). Network Intrusion Detection Using Danger Theory and Genetic Algorithms. In: Madureira, A., Abraham, A., Gamboa, D., Novais, P. (eds) Intelligent Systems Design and Applications. ISDA 2016. Advances in Intelligent Systems and Computing, vol 557. Springer, Cham. https://doi.org/10.1007/978-3-319-53480-0_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53480-0_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53479-4

  • Online ISBN: 978-3-319-53480-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics