DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tang, Wan | ko |
dc.contributor.author | Peng, Limei | ko |
dc.contributor.author | Yang, Ximin | ko |
dc.contributor.author | Xie, Xia | ko |
dc.contributor.author | Cao, Yang | ko |
dc.date.accessioned | 2013-03-08T20:28:02Z | - |
dc.date.available | 2013-03-08T20:28:02Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2010-12 | - |
dc.identifier.citation | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.4, no.6, pp.1273 - 1293 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.uri | http://hdl.handle.net/10203/94207 | - |
dc.description.abstract | Immune-inspired intrusion detection is a promising technology for network security, and well known for its diversity, adaptation, self-tolerance, etc. However, scalability and coverage are two major drawbacks of the immune-inspired intrusion detection systems (IIDSes). In this paper, we propose an IIDS framework, named GEP-IIDS, with improved basic system elements to address these two problems. First, an additional bio-inspired technique, gene expression programming (GEP), is introduced in detector (corresponding to detection rules) representation. In addition, inspired by the avidity model of immunology, new avidity/affinity functions taking the priority of attributes into account are given. Based on the above two improved elements, we also propose a novel immune algorithm that is capable of integrating two bio-inspired mechanisms (i.e., negative selection and positive selection) by using a balance factor. Finally, a pruning algorithm is given to reduce redundant detectors that consume footprint and detection time but do not contribute to improving performance. Our experimental results show the feasibility and effectiveness of our solution to handle the scalability and coverage problems of IIDS. | - |
dc.language | English | - |
dc.publisher | KSII-KOR SOC INTERNET INFORMATION | - |
dc.subject | NEGATIVE SELECTION | - |
dc.subject | ATTACKS | - |
dc.subject | SYSTEM | - |
dc.title | GEP-based Framework for Immune-Inspired Intrusion Detection | - |
dc.type | Article | - |
dc.identifier.wosid | 000285646500017 | - |
dc.identifier.scopusid | 2-s2.0-78650822925 | - |
dc.type.rims | ART | - |
dc.citation.volume | 4 | - |
dc.citation.issue | 6 | - |
dc.citation.beginningpage | 1273 | - |
dc.citation.endingpage | 1293 | - |
dc.citation.publicationname | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.identifier.doi | 10.3837/tiis.2010.12.017 | - |
dc.contributor.localauthor | Peng, Limei | - |
dc.contributor.nonIdAuthor | Tang, Wan | - |
dc.contributor.nonIdAuthor | Yang, Ximin | - |
dc.contributor.nonIdAuthor | Xie, Xia | - |
dc.contributor.nonIdAuthor | Cao, Yang | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Network intrusion detection | - |
dc.subject.keywordAuthor | artificial immune system | - |
dc.subject.keywordAuthor | gene expression programming | - |
dc.subject.keywordPlus | NEGATIVE SELECTION | - |
dc.subject.keywordPlus | SYSTEM | - |
dc.subject.keywordPlus | ATTACKS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.