A Survey of Artificial Immune System Based Intrusion Detection
In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AI...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2014/156790 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832557089063436288 |
---|---|
author | Hua Yang Tao Li Xinlei Hu Feng Wang Yang Zou |
author_facet | Hua Yang Tao Li Xinlei Hu Feng Wang Yang Zou |
author_sort | Hua Yang |
collection | DOAJ |
description | In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. |
format | Article |
id | doaj-art-4086ecc44d1446b4987ed4b89c679cc3 |
institution | Kabale University |
issn | 2356-6140 1537-744X |
language | English |
publishDate | 2014-01-01 |
publisher | Wiley |
record_format | Article |
series | The Scientific World Journal |
spelling | doaj-art-4086ecc44d1446b4987ed4b89c679cc32025-02-03T05:43:39ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/156790156790A Survey of Artificial Immune System Based Intrusion DetectionHua Yang0Tao Li1Xinlei Hu2Feng Wang3Yang Zou4College of Computer Science, Sichuan University, Chengdu 610064, ChinaCollege of Computer Science, Sichuan University, Chengdu 610064, ChinaCollege of Computer Science, Sichuan University, Chengdu 610064, ChinaCollege of Computer Science, Sichuan University, Chengdu 610064, ChinaCollege of Computer Science, Sichuan University, Chengdu 610064, ChinaIn the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.http://dx.doi.org/10.1155/2014/156790 |
spellingShingle | Hua Yang Tao Li Xinlei Hu Feng Wang Yang Zou A Survey of Artificial Immune System Based Intrusion Detection The Scientific World Journal |
title | A Survey of Artificial Immune System Based Intrusion Detection |
title_full | A Survey of Artificial Immune System Based Intrusion Detection |
title_fullStr | A Survey of Artificial Immune System Based Intrusion Detection |
title_full_unstemmed | A Survey of Artificial Immune System Based Intrusion Detection |
title_short | A Survey of Artificial Immune System Based Intrusion Detection |
title_sort | survey of artificial immune system based intrusion detection |
url | http://dx.doi.org/10.1155/2014/156790 |
work_keys_str_mv | AT huayang asurveyofartificialimmunesystembasedintrusiondetection AT taoli asurveyofartificialimmunesystembasedintrusiondetection AT xinleihu asurveyofartificialimmunesystembasedintrusiondetection AT fengwang asurveyofartificialimmunesystembasedintrusiondetection AT yangzou asurveyofartificialimmunesystembasedintrusiondetection AT huayang surveyofartificialimmunesystembasedintrusiondetection AT taoli surveyofartificialimmunesystembasedintrusiondetection AT xinleihu surveyofartificialimmunesystembasedintrusiondetection AT fengwang surveyofartificialimmunesystembasedintrusiondetection AT yangzou surveyofartificialimmunesystembasedintrusiondetection |