Abstract
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine. It summarizes and compares the pros and cons of the four methods, which are basic artificial intelligence immune algorithm, detection of unknown viruses based on immunity theory, malicious code immunity based on cryptography and automated intrusion response based on danger theory. It elaborates the process of the algorithm of the proposed immune algorithm, discusses a variety of input and output signals, gives the samples of the actual input signals, applies the coefficient of variation method to determine the values of the weights so as to enhance the discrimination ability of signal processing results, describes the principle and algorithm steps of fuzzy weighted support vector machine clustering method within immune algorithm proposed. By comparing the fuzzy aggregation before and after the immunization program experiments, it draws the conclusion that the proposed immune algorithm can optimize the input signal, fuzzy clustering the signal and the antigen, so as to bring down the number of immunization strategies and reduce the immune response time, as a result it improve the efficiency and performance of the immune system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)
Dasgupta, D.: Advances in Artificial Immune Systems. Computational Intelligence Magazine 1(4), 40–49 (2006)
Twycross, J., Aickelin, U.: Towards a Conceptual Framework for Innate Immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 112–125. Springer, Heidelberg (2005)
Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. Natural Computing 6(4), 413–466 (2007)
Al-Hammadi, Y., Aickelin, U., Greensmith, J.: DCA for detecting bots. In: IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, pp. 1–10 (2008)
Sun, F.-X., Jin, X.-T.: Immune danger theory based quantitative model for network security situation awareness. Application Research of Computers 28(7), 2680–2686 (2011) (in Chinese)
Zheng, J.-Q., Chen, Y.-F., Zhang, W.: A Survey of artificial immune applications. Artificial Intelligence Review 34(1), 19–34 (2010)
Jain, P., Goyal, S.: An Adaptive Intrusion Prevention System Based on Immunity. In: International Conference on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, India, pp. 759–763 (2009)
Zeng, Li, T.: A Novel Computer Virus Detection Method from Ideas of Immunology. In: International Conference on Multimedia Information Networking and Security, Wuhan, China, pp. 412–416 (2009)
Wei, Y., Zhang, J., Xu, H.: The Application of Immune Theory to Virus Detection. Computer Applications and Software 25(9), 52–54 (2008)
Chen, Z., Shen, C., Wu, X.: A Crypto-based Immunization Model against Malicious Code. Computer Science 82(1), 288–289 (2008) (in Chinese)
Peng, L.-X., Xie, D.-Q., Fu, Y.-F., Xiong, W., Shen, Y.-L.: Automated intrusion response system model based on danger theory. Journal on Communications 33(1), 136–144 (2012) (in Chinese)
Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems. In: Proceedings of the 1st Internet Conference on Artificial Immune Systems, ICARIS 2002, Canterbury, UK, pp. 141–148 (2002)
Kim, J., Greensmith, J., Twycross, J., Aickelin, U.: Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory. In: Proceedings of Adaptive and Resilient Computing Security Workshop, ARCS 2005, Santa Fe, USA, pp. 1–4 (2005)
Meng, Q., Zhao, W.: Study on fault diagnosis algorithm based on artificial immune danger theory. In: International Conference on Mechanic Automation and Control Engineering, MACE 2010, Hangzhou, China, pp. 5997–6000 (2010)
Matzinge, P.: The Real Function of the Immune System or Tolerance and Four D’s (Danger, Death, Destruction and Distress), http://cmmg.biosci.wayne.edu/asg/polly.html
Deng, N., Tian, Y.: Support Vector Machine: Theory, Algorithm and Continuation, pp. 81–111. Science Press, Beijing (2009) (in Chinese)
Li, P., Wang, R.-C., Gao, D.-H.: Research on Rootkit Dynamic Detection based on Fuzzy Pattern Recognition and Support Virtual Machine Technology. Acta Electronica Sinica 40(1), 115–120 (2012) (in Chinese)
Yang, Z., Liu, G.: Thoery and Application of Unascertained Support Vector Machine, pp. 191–193. Science Press, Beijing (2007) (in Chinese)
Twycross, J., Aickelin, U.: Libtissue - implementing innate immunity. In: IEEE Congress on Evolutionary Computation, Sheraton Vancouver Wall Centre, Vancouver, BC, Canada, pp. 499–506 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, P., Wang, R., Zhou, Y., Dai, Q. (2013). Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine. In: Wang, R., Xiao, F. (eds) Advances in Wireless Sensor Networks. CWSN 2012. Communications in Computer and Information Science, vol 334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36252-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-36252-1_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36251-4
Online ISBN: 978-3-642-36252-1
eBook Packages: Computer ScienceComputer Science (R0)