Negative Selection Approach Application in Network Intrusion Detection Systems
Authors:
Amira Sayed A. Aziz,
Ahmad Taher Azar,
Aboul Ella Hassanien,
Sanaa El-Ola Hanafy
Abstract:
Nature has always been an inspiration to researchers with its diversity and robustness of its systems, and Artificial Immune Systems are one of them. Many algorithms were inspired by ongoing discoveries of biological immune systems techniques and approaches. One of the basic and most common approach is the Negative Selection Approach, which is simple and easy to implement. It was applied in many f…
▽ More
Nature has always been an inspiration to researchers with its diversity and robustness of its systems, and Artificial Immune Systems are one of them. Many algorithms were inspired by ongoing discoveries of biological immune systems techniques and approaches. One of the basic and most common approach is the Negative Selection Approach, which is simple and easy to implement. It was applied in many fields, but mostly in anomaly detection for the similarity of its basic idea. In this paper, a review is given on the application of negative selection approach in network security, specifically the intrusion detection system. As the work in this field is limited, we need to understand what the challenges of this approach are. Recommendations are given by the end of the paper for future work.
△ Less
Submitted 10 March, 2014;
originally announced March 2014.
Continuous Features Discretization for Anomaly Intrusion Detectors Generation
Authors:
Amira Sayed A. Aziz,
Ahmad Taher Azar,
Aboul Ella Hassanien,
Sanaa Al-Ola Hanafy
Abstract:
Network security is a growing issue, with the evolution of computer systems and expansion of attacks. Biological systems have been inspiring scientists and designs for new adaptive solutions, such as genetic algorithms. In this paper, we present an approach that uses the genetic algorithm to generate anomaly net- work intrusion detectors. In this paper, an algorithm propose use a discretization me…
▽ More
Network security is a growing issue, with the evolution of computer systems and expansion of attacks. Biological systems have been inspiring scientists and designs for new adaptive solutions, such as genetic algorithms. In this paper, we present an approach that uses the genetic algorithm to generate anomaly net- work intrusion detectors. In this paper, an algorithm propose use a discretization method for the continuous features selected for the intrusion detection, to create some homogeneity between values, which have different data types. Then,the intrusion detection system is tested against the NSL-KDD data set using different distance methods. A comparison is held amongst the results, and it is shown by the end that this proposed approach has good results, and recommendations is given for future experiments.
△ Less
Submitted 7 March, 2014;
originally announced March 2014.