Skip to main content

An Immune Multi-agent System for Network Intrusion Detection

  • Conference paper
Advances in Computation and Intelligence (ISICA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5370))

Included in the following conference series:

Abstract

Inspired by the immune theory and multi-agent systems, an immune multi-agent system for network intrusion detection is established. The concept of immune agent is introduced. And its logical structure and running mechanism are established. This model implements the multi-layer and distributed mechanism for network intrusion detection. The experimental results show that the new model not only reduces the False-Negative rate and False-Positive rate effectively but also has the feature to adapt to continuous changing network environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bai, Y., Kobayashi, H.: Intrusion Detection Systems: technology and development. IEEE Advanced Information Networking and Applications, 710–715 (2003)

    Google Scholar 

  2. Pilz, A., Swoboda, J.: Network management information models. International Journal of Electronics and Communications 58, 165–171 (2004)

    Article  Google Scholar 

  3. Dong, Y., Quian, J., Shi, M.: A cooperative intrusion detection system based on autonomous agents. In: IEEE CCECE 2003, vol. 2, pp. 861–863 (2003)

    Google Scholar 

  4. Heseleer, D., Forrest, S.: An immunological approach to change detection: algorithm, analysis and implication. In: Proc. of IEEE Symposium on Research in Security and Privacy, Oakland, pp. 110–119 (1996)

    Google Scholar 

  5. Kim, J., Bentley, P.: The Artificial Immune Model for Network Intrusion Detection. In: 7th European Congress on Intelligent Techniques and Soft Computing (1999)

    Google Scholar 

  6. Harmer, P.K., Lamont, G.B.: An Agent Based Architecture for a Computer Virus Immune System. In: Proc. of the Genetic and Evolutionary Computation Conference, Orlando, Florida, USA (1999)

    Google Scholar 

  7. Esponda, F., Forrest, S., Helman, P.: A formal frame work for positive and negative detection schemes. IEEE Transactions On Systems Man and Cybernetics Part B-Cybernetics 34(1), 357–373 (2004)

    Article  Google Scholar 

  8. Hegazy, I.M., Faheem, H.M.: Evaluating how well agent-based IDS perform. IEEE Potentials 24(2), 27–30 (2005)

    Article  Google Scholar 

  9. Ballet, P., Rodin, V.: Immune Mechanisms to Regulate Multi-Agents Systems. In: GECCO 2000, Las Vegas, Nevada, USA (2000)

    Google Scholar 

  10. Jerne, N.K.: Towards a Network Theory of the Immune System. Annnual Immunology 125C, 373–389 (1974)

    Google Scholar 

  11. Li, T.: Computer Immunology. Publication House of Electric Industry, Beijing (2004)

    Google Scholar 

  12. Zhongzhi, S.: Intelligent agent and their application. Science Press, Beijing (2000)

    Google Scholar 

  13. Hofmeyr, A., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation 7(1) (2000)

    Google Scholar 

  14. Perelson, A.S.: Immunology for physicists. Review of Modern Physics 69(4) (1997)

    Google Scholar 

  15. Dasgupta, D.: An Artificial Immune System as a Multi-Agent Decision Support System. In: Proc. of the IEEE International Conference on SMC, San Diego (1998)

    Google Scholar 

  16. Li, T.: A New Model for Dynamic Intrusion Detection. LNCS, pp. 72–84 (2005)

    Google Scholar 

  17. Esponda, F., Forrest, S., Helman, P.: Positive and Negative Detection. IEEE Transactions on Systems, Man and Cybernetics (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, D.G., Li, T., Liu, S.J., Liang, G., Zhao, K. (2008). An Immune Multi-agent System for Network Intrusion Detection. In: Kang, L., Cai, Z., Yan, X., Liu, Y. (eds) Advances in Computation and Intelligence. ISICA 2008. Lecture Notes in Computer Science, vol 5370. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92137-0_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92137-0_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92136-3

  • Online ISBN: 978-3-540-92137-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy