Skip to main content

Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine

  • Conference paper
Advances in Wireless Sensor Networks (CWSN 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 334))

Included in the following conference series:

Abstract

According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine. It summarizes and compares the pros and cons of the four methods, which are basic artificial intelligence immune algorithm, detection of unknown viruses based on immunity theory, malicious code immunity based on cryptography and automated intrusion response based on danger theory. It elaborates the process of the algorithm of the proposed immune algorithm, discusses a variety of input and output signals, gives the samples of the actual input signals, applies the coefficient of variation method to determine the values of the weights so as to enhance the discrimination ability of signal processing results, describes the principle and algorithm steps of fuzzy weighted support vector machine clustering method within immune algorithm proposed. By comparing the fuzzy aggregation before and after the immunization program experiments, it draws the conclusion that the proposed immune algorithm can optimize the input signal, fuzzy clustering the signal and the antigen, so as to bring down the number of immunization strategies and reduce the immune response time, as a result it improve the efficiency and performance of the immune system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger Theory: The Link between AIS and IDS? In: Timmis, J., Bentley, P.J., Hart, E. (eds.) ICARIS 2003. LNCS, vol. 2787, pp. 147–155. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Dasgupta, D.: Advances in Artificial Immune Systems. Computational Intelligence Magazine 1(4), 40–49 (2006)

    Google Scholar 

  3. Twycross, J., Aickelin, U.: Towards a Conceptual Framework for Innate Immunity. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) ICARIS 2005. LNCS, vol. 3627, pp. 112–125. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection - a review. Natural Computing 6(4), 413–466 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  5. Al-Hammadi, Y., Aickelin, U., Greensmith, J.: DCA for detecting bots. In: IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, pp. 1–10 (2008)

    Google Scholar 

  6. Sun, F.-X., Jin, X.-T.: Immune danger theory based quantitative model for network security situation awareness. Application Research of Computers 28(7), 2680–2686 (2011) (in Chinese)

    Google Scholar 

  7. Zheng, J.-Q., Chen, Y.-F., Zhang, W.: A Survey of artificial immune applications. Artificial Intelligence Review 34(1), 19–34 (2010)

    Article  MathSciNet  Google Scholar 

  8. Jain, P., Goyal, S.: An Adaptive Intrusion Prevention System Based on Immunity. In: International Conference on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, India, pp. 759–763 (2009)

    Google Scholar 

  9. Zeng, Li, T.: A Novel Computer Virus Detection Method from Ideas of Immunology. In: International Conference on Multimedia Information Networking and Security, Wuhan, China, pp. 412–416 (2009)

    Google Scholar 

  10. Wei, Y., Zhang, J., Xu, H.: The Application of Immune Theory to Virus Detection. Computer Applications and Software 25(9), 52–54 (2008)

    Google Scholar 

  11. Chen, Z., Shen, C., Wu, X.: A Crypto-based Immunization Model against Malicious Code. Computer Science 82(1), 288–289 (2008) (in Chinese)

    Google Scholar 

  12. Peng, L.-X., Xie, D.-Q., Fu, Y.-F., Xiong, W., Shen, Y.-L.: Automated intrusion response system model based on danger theory. Journal on Communications 33(1), 136–144 (2012) (in Chinese)

    Google Scholar 

  13. Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to Artificial Immune Systems. In: Proceedings of the 1st Internet Conference on Artificial Immune Systems, ICARIS 2002, Canterbury, UK, pp. 141–148 (2002)

    Google Scholar 

  14. Kim, J., Greensmith, J., Twycross, J., Aickelin, U.: Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory. In: Proceedings of Adaptive and Resilient Computing Security Workshop, ARCS 2005, Santa Fe, USA, pp. 1–4 (2005)

    Google Scholar 

  15. Meng, Q., Zhao, W.: Study on fault diagnosis algorithm based on artificial immune danger theory. In: International Conference on Mechanic Automation and Control Engineering, MACE 2010, Hangzhou, China, pp. 5997–6000 (2010)

    Google Scholar 

  16. Matzinge, P.: The Real Function of the Immune System or Tolerance and Four D’s (Danger, Death, Destruction and Distress), http://cmmg.biosci.wayne.edu/asg/polly.html

  17. Deng, N., Tian, Y.: Support Vector Machine: Theory, Algorithm and Continuation, pp. 81–111. Science Press, Beijing (2009) (in Chinese)

    Google Scholar 

  18. Li, P., Wang, R.-C., Gao, D.-H.: Research on Rootkit Dynamic Detection based on Fuzzy Pattern Recognition and Support Virtual Machine Technology. Acta Electronica Sinica 40(1), 115–120 (2012) (in Chinese)

    Google Scholar 

  19. Yang, Z., Liu, G.: Thoery and Application of Unascertained Support Vector Machine, pp. 191–193. Science Press, Beijing (2007) (in Chinese)

    Google Scholar 

  20. Twycross, J., Aickelin, U.: Libtissue - implementing innate immunity. In: IEEE Congress on Evolutionary Computation, Sheraton Vancouver Wall Centre, Vancouver, BC, Canada, pp. 499–506 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, P., Wang, R., Zhou, Y., Dai, Q. (2013). Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine. In: Wang, R., Xiao, F. (eds) Advances in Wireless Sensor Networks. CWSN 2012. Communications in Computer and Information Science, vol 334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36252-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36252-1_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36251-4

  • Online ISBN: 978-3-642-36252-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics