Skip to main content

A Real Time Anomaly Detection System Based on Probabilistic Artificial Immune Based Algorithm

  • Conference paper
Artificial Immune Systems (ICARIS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7597))

Included in the following conference series:

  • 926 Accesses

Abstract

Artificial Immune System (AIS)-based evolutionary algorithms combine rules and randomness to solve optimization and classification problems. Due to their capability in identifying self and non self samples, they have also gained attention in intrusion detection systems. In this paper, we propose a real-time AIS-based anomoly detection algorithm for intrusion detection. The most important features of the proposed method are its high detection rate, low false alarm, low computational complexity, and real-time response to the incoming samples. We compare our  proposed method with several  well-known anomaly detection algorithms on various datasets. We demonstrate that the  proposed method performs the best among others in terms of false alarm, detection rate and time response.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Masri, W., Podgurski, A.: Application-based anomaly intrusion detection with dynamic information flow analysis. Computers & Security 27, 176–187 (2008)

    Article  Google Scholar 

  2. Seok Lee, K., Woo, Z.: A new meta-heuristic algorithm for continuous engineering optimization: harmony search theory and practice. Computer Methods in Applied Mechanic and Engineering 194, 3902–3933 (2005)

    Article  MATH  Google Scholar 

  3. Zhong, Y., Zhang, L.: An Adaptive Artificial Immune Network for Supervised Classification of Multi-Hyperspectral Remote Sensing Imagery. IEEE transaction on Geoscience and Remote Sensing 50(3), 894–909 (2012)

    Article  Google Scholar 

  4. Delibasis, K.K., Asvestas, P.A., Matsopoulos, G.K., Zoulias, E., Tseleni-Balafouta, S.: Computer-Aided Diagnosis of Thyroid Malignancy Using an Artificial ImmuneSystem Classification Algorithm. IEEE Transactions onInformation Technology in Biomedicine 13(5), 680–686 (2009)

    Article  Google Scholar 

  5. Mohammadi, M., Raahemi, B., Akbari, A., Nassersharif, B., Moeinzadeh, H.: Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms. Information Sciences 189, 219–232 (2012)

    Article  Google Scholar 

  6. Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol. 3102, pp. 287–298. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Bolón-Canedo, V., Sánchez-Maroño, N., Alonso-Betanzos, A.: Feature selection and classification in multiple class datasets: An application to KDDCup 1999 dataset. Systems with Applications 38(5), 5947–5957 (2011)

    Article  Google Scholar 

  8. Tsai, C., Lin, C.: A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognition 43(1), 222–229 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  9. Gogoi, P., Bhattacharyya, D.: Anomaly Detection Analysis of Intrusion Data using Supervised & Unsupervised Approach. Journal of Convergence Information Technology 5(1) (February 2010)

    Google Scholar 

  10. Mohammadi, M., Raahemi, B., Akbari, A., Nassersharif, B.: Unsupervised Sample Reduction Using Clustering for Intrusion Detection System, Submitted to Security and Communication Network Journal (under review)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mohammadi, M., Akbari, A., Raahemi, B., Nassersharif, B. (2012). A Real Time Anomaly Detection System Based on Probabilistic Artificial Immune Based Algorithm. In: Coello Coello, C.A., Greensmith, J., Krasnogor, N., Liò, P., Nicosia, G., Pavone, M. (eds) Artificial Immune Systems. ICARIS 2012. Lecture Notes in Computer Science, vol 7597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33757-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33757-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33756-7

  • Online ISBN: 978-3-642-33757-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics