Abstract
A new method of intrusion detection based on the danger theory and the cloud model is presented in this paper. The main idea of danger signal generation mechanism of this method is stated as follows. Antigen apoptosis and necrosis will affect antibody concentrations. This paper has defined the concentration variability functions concerned and divided the risk levels. Changes of antibody concentrations in the immune system are determined by the cloud model, and then danger signals will be sent according to the changes. This method has successfully solved the problems of high false positive rate and high false negative rate. The theoretical analysis and experimental results show that the method is effective to intrusion detection with advantages of diversity, real-time and adaptability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Li, T.: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004) (in Chinese)
Aickelin, U., Cayzer, S.: The Danger Theory and Its Application to AIS. In: 1st International Conference on AIS (2002), pp. 141–148 (2002)
Matzinger, P.: The Danger Model: A Renewed Sense of Self. Science, 301–305 (2002)
Shifflet, J.: A technique independent fusion model for network intrusion detection. In: Proc. of the Misstates Conference on Undergraduate Research in Computer Science and Mathematics, pp. 13–19 (2005)
Li, T.: An Immune Based Model for Network Monitoring. Chinese Journal of Computers 29, 1515–1522 (2006) (in Chinese)
Li, D., Liu, C.: Study on the Universality of the Normal Cloud Model. Engineering Science 6, 28–34 (2004) (in Chinese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ruirui, Z., Tao, L., Xin, X., Yuanquan, S. (2011). The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model. In: Wu, Y. (eds) Computing and Intelligent Systems. ICCIC 2011. Communications in Computer and Information Science, vol 234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24091-1_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-24091-1_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24090-4
Online ISBN: 978-3-642-24091-1
eBook Packages: Computer ScienceComputer Science (R0)