Skip to main content

An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7530))

Abstract

Traditional intrusion detection system is confronted with the pressure of processing massive network traffic data which increases sharply. Besides, its feature of static detection causes the weak adaptability for the network environment. To overcome the former problems, an architecture for network intrusion detection based on cloud computing and artificial immune principle is proposed. It consists of local intrusion detection sub-system and cloud computing platform which provides the services of intrusion detection. The local intrusion detection sub-system captures and simply preprocesses the network traffics. The cloud computing platform deals with the true transactions of intrusion detection. It interacts with the local intrusion detection sub-system through standard service interface and responds the intrusion detection requests of the local intrusion detection sub-system. Furthermore, it simulates the good features of artificial immune principle and adopts self-learning mechanism to evolve intrusion detection elements to make the proposed architecture adaptive for the real network environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Symantec, State of Security Survey (2011), http://www.symantec.com/content/en/us/about/media/pdfs/symc_state_of_security_2011.pdf

  2. Chen, K., Zheng, W.M.: Cloud Computing: System Instances and Current Research. Journal of Software 20, 1337–1348 (2009)

    Article  Google Scholar 

  3. Wikipedia, http://en.wikipedia.org/wiki/John_Gage

  4. Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on Cloud Computing Security. Journal of Software 22, 71–83 (2011)

    Article  Google Scholar 

  5. Mo, H.W., Zuo, X.Q.: Artificial Immune System. Science Press, Beijing (2009)

    Google Scholar 

  6. Li, T.: Computer immunology. Publishing House of Electronics Industry, Beijing (2004)

    Google Scholar 

  7. Xiao, R.B., Wang, L.: Artificial immune system: principle, models, analysis and perspectives. Chinese Journal of Computers 25, 1281–1293 (2002)

    Google Scholar 

  8. Jiao, L.C., Du, H.F.: Development and Prospect of the Artificial Immune System. Acta Electronica Sinica 31, 1540–1548 (2003)

    Google Scholar 

  9. Dasgupta, D.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6, 281–291 (2002)

    Article  Google Scholar 

  10. Dasgupta, D.: Immunity-based intrusion detection system: a general framework. In: The 22nd National Information Systems Security Conference (1999)

    Google Scholar 

  11. Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: The Congress on Evolutionary Computation, pp. 1015–1020 (2002)

    Google Scholar 

  12. Hofmeyr, S.A.: An immunological model of distributed detection and its application to computer security. Ph. D. dissertation, Department of Computer Sciences, University of New Mexico (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, C., Xie, C., Zhang, Y., Li, Q., Peng, L. (2012). An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection. In: Lei, J., Wang, F.L., Deng, H., Miao, D. (eds) Artificial Intelligence and Computational Intelligence. AICI 2012. Lecture Notes in Computer Science(), vol 7530. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33478-8_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33478-8_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33477-1

  • Online ISBN: 978-3-642-33478-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics