Abstract
In order to find the attack in real time, an intrusion prediction method based on intelligent immune threshold matching algorithm was presented. Using a dynamic load-balancing algorithm, network data packet was distributed to a set of predictors by the balancer; it could avoid packet loss and false negatives in high-performance network with handling heavy traffic loads in real-time. In addition, adopting the dynamic threshold value, which was generated from variable network speed, the mature antibody could better match the antigen of the database, and consequently the accuracy of prediction was increased. Experiment shows this intrusion prediction method has relatively low false positive rate and false negative rate, so it effectively resolves the shortage of intrusion detection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Denning, D.E.: An Intrusion-detection Model. IEEE Trans. Software Eng. 2, 122–132 (1987)
Lauf, A.P., Peters, R.A., Robinson, W.H.: A Distributed Intrusion Detection System for Resource-constrained Devices in Ad-hoc Networks. Ad Hoc Networks 8, 253–266 (2010)
Beghdad, R.: Efficient Deterministic Method for Detecting New U2R attacks. Computer Communications 32, 1104–1110 (2009)
Zhang, X.Q., Gu, C.H.: A Method to Extract Network Intrusion Detection Feature. Journal of South China University of Technology (Natural Science) 38, 81–86 (2010)
Gupta, K.K., Nath, B., Kotagiri, R.: Layered Approach Using Conditional Random Fields for Intrusion Detection. IEEE Transactions on Dependable and Secure Computing 7, 35–49 (2010)
Cao, W.B., Haralick, R.: Affine Feature Extraction: A Generalization of the Fukunaga-Koontz Transformation. Engineering Applications of Artificial Intelligence 22, 40–47 (2009)
Cao, L.C.: A High-efficiency Intrusion Prediction Technology Based on Markov Chain. In: International Conference on Computational Intelligence and Security Workshops, pp. 518–521 (2007)
Zhang, H., Wu, L.F., Zhang, Y.S., et al.: An Algorithm of r-Adjustable Negative Selection Algorithm and Its Simulation Analysis. Chinese Journal of Computers 28, 1614–1619 (2005)
Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 8, 443–473 (2000)
Jiang, W.B., Song, H., Dai, Y.Q.: Real-time Intrusion Detection for High-speed Networks. Computer & Security 24, 287–295 (2005)
He, S., Luo, W.J., Wang, X.F.: A Negative Selection Algorithm with the Variable Length Detector 18, 1361–1368 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cao, LC. (2010). Enhancing Efficiency of Intrusion Prediction Based on Intelligent Immune Method. In: Huang, DS., Zhang, X., Reyes GarcÃa, C.A., Zhang, L. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2010. Lecture Notes in Computer Science(), vol 6216. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14932-0_74
Download citation
DOI: https://doi.org/10.1007/978-3-642-14932-0_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14931-3
Online ISBN: 978-3-642-14932-0
eBook Packages: Computer ScienceComputer Science (R0)