Skip to main content

The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model

  • Conference paper
Computing and Intelligent Systems (ICCIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 234))

Included in the following conference series:

  • 1500 Accesses

Abstract

A new method of intrusion detection based on the danger theory and the cloud model is presented in this paper. The main idea of danger signal generation mechanism of this method is stated as follows. Antigen apoptosis and necrosis will affect antibody concentrations. This paper has defined the concentration variability functions concerned and divided the risk levels. Changes of antibody concentrations in the immune system are determined by the cloud model, and then danger signals will be sent according to the changes. This method has successfully solved the problems of high false positive rate and high false negative rate. The theoretical analysis and experimental results show that the method is effective to intrusion detection with advantages of diversity, real-time and adaptability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004) (in Chinese)

    Google Scholar 

  2. Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to AIS. In: 1st International Conference on AIS (2002), pp. 141–148 (2002)

    Google Scholar 

  3. Matzinger, P.: The Danger Model: A Renewed Sense of Self. Science, 301–305 (2002)

    Google Scholar 

  4. Shifflet, J.: A technique independent fusion model for network intrusion detection. In: Proc. of the Misstates Conference on Undergraduate Research in Computer Science and Mathematics, pp. 13–19 (2005)

    Google Scholar 

  5. Li, T.: An Immune Based Model for Network Monitoring. Chinese Journal of Computers 29, 1515–1522 (2006) (in Chinese)

    Google Scholar 

  6. Li, D., Liu, C.: Study on the Universality of the Normal Cloud Model. Engineering Science 6, 28–34 (2004) (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ruirui, Z., Tao, L., Xin, X., Yuanquan, S. (2011). The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model. In: Wu, Y. (eds) Computing and Intelligent Systems. ICCIC 2011. Communications in Computer and Information Science, vol 234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24091-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24091-1_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24090-4

  • Online ISBN: 978-3-642-24091-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics