Abstract
Intrusion Detection (ID) is one of the most challenging problems in today’s era of computer security. New innovative ideas are used by the hackers to break the security, hence the challenge for developing better ID systems are increasing day-by-day. In this paper, we applied the Artificial Immune System (AIS) based classifiers for intrusion detection. Each classifier is evaluated based on high accuracy and detection rate with low false alarm rate. The results are compared using percentage split (80%) and cross validation (10 fold) test options basing on two nominal target attributes i.e. type of attacks and protocol types having 5 and 3 sub-classes respectively. The experimental results indicate that the performance of CSCA (clonal selection classification algorithm) is better AIS based classifier for network based Intrusion Detection.
References
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: CISDA 2009 (2009)
Chan, F.T.S., Prakash, A., Tibrewal, R.K., Tiwari, M.K.: Clonal selection approach for network intrusion detection. In: Proceedings of the 3rd International Conference on Intelligent Computational Systems, ICICS 2013, Singapore, 29–30 April 2013
Mohammad, M.N., Sulaiman, N., Muhsin, O.A.: A novel intrusion detection system by using intelligent data mining in WEKA environment. Procedia Comput. Sci. 3, 1237–1242 (2011)
Matzinger, P.: Tolerance, danger and the extended family. Annu. Rev. Immunol. 12, 991–1045 (1994)
Jain, Y.K., Upendra: Intrusion detection using supervised learning with feature set reduction. Int. J. Comput. Appl. 33(6), November 2011. ISSN: 0975-8887
de Castro, L.N., Von Zuben, F.J.: Learning and optimization using the clonal selection principle. IEEE Trans. Evol. Comput. 6(3), 239–251 (2002). doi:10.1109/tevc.2002.1011539. Special Issue on Artificial Immune Systems. IEEE
Kalyani, G., Jaya Lakshmi, A.: Performance assessment of different classification techniques for intrusion detection. IOSRJCE 7(5), 25–29 (2012). ISSN: 2278-0661, ISBN: 2278-8727
NSL-KDD data set for network-based intrusion detection systems, March 2009. http://nsl.cs.unb.ca/NSL-KDD/. Accessed 05 Dec 2016
Dutt, I., Borah, S.: Some studies in intrusion detection using data mining techniques. 4(7), July 2015. doi:10.15680/IJIRSET.2015.0407090
Burnet, F.M.: A modification of Jerne’s theory of antibody production using the concept of clonal selection. CA Cancer J. Clin. 26(2), 119–121 (1976). doi:10.3322/canjclin.26.2.119. PMID 816431
Nguyen, H.A., Choi, D.: Application of data mining to network intrusion detection: classifier selection model. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol. 5297, pp. 399–408. Springer, Heidelberg (2008). doi:10.1007/978-3-540-88623-5_41
Modi, U., Jain, A.: A survey of IDS classification using KDD CUP 99 dataset in WEKA. Int. J. Sci. Eng. Res. 6(11), 947–954 (2015)
Siddiqui, M.K., Naahid, S.: Analysis of KDD CUP 99 dataset using clustering based data mining. Int. J. Database Theory Appl. 6(5), 23–34 (2013)
Jerne, N.K.: Towards a network theory of the immune system. Ann. Immunol. (Inst. Pasteur) 125C, 373–389 (1974)
Debar, H.: An Introduction to Intrusion-Detection Systems. IBM Research, Zurich Research Laboratory, Säumerstrasse 4, CH–8803 Rüschlikon, Switzerland
KDD Cup 1999 data. https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 05 Dec 2016
SIGKDD. https://en.wikipedia.org/wiki/SIGKDD. Accessed 05 Dec 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Das, R.K., Panda, M., Dash, S., Mishra, R.K. (2017). Application of Artificial Immune System Algorithms for Intrusion Detection. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 776. Springer, Singapore. https://doi.org/10.1007/978-981-10-6430-2_38
Download citation
DOI: https://doi.org/10.1007/978-981-10-6430-2_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6429-6
Online ISBN: 978-981-10-6430-2
eBook Packages: Computer ScienceComputer Science (R0)