By Topic

Design of a new distributed model for Intrusion Detection System based on Artificial Immune System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Farhoud Hosseinpour ; Faculty of Computer Science and Information System, University of Technology Malaysia, 54100 Kuala Lumpur, Malaysia ; Kamalrulnizam Abu Bakar ; Amir Hatami Hardoroudi ; Ali Farhang Dareshur

Currently Intrusion detection systems have grown to be an ordinary component of network security infrastructure. With mounting global network connectivity, the issue of intrusion has achieved importance, promoting active research on efficient Intrusion Detection Systems (IDS). Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security. The unique features AIS encourage the researchers to employ this techniques in variety of applications and especially in intrusion detection systems. Proper IDS design is essential to improve the performance of the IDS. The centralized design of this IDS has disadvantage of central processing for massive processes for each packets passing trough network. In this paper we proposed a distributed multi-layerd framework to enhance the detection performance and efficiency of this IDS. In our design the genetic algorithm is used for enhancing the secondary immune response. The fundamental design of our proposed AIS based IDS consists of 2 main components: IDS central engine and detection sensors. Each of these components is composed of some agents which correlate with each other in order to detect the anomalies and intrusions. Our design goal is to decrease the detection time for each connection by distributing the detectors to each host.

Published in:

Advanced Information Management and Service (IMS), 2010 6th International Conference on

Date of Conference:

Nov. 30 2010-Dec. 2 2010