scispace - formally typeset
Open Access

Artificial Immune System Based Intrusion Detection: Innate Immunity using an Unsupervised Learning Approach

Reads0
Chats0
TLDR
The adaptive immune system in this proposed architecture also takes advantage of the distributed structure, which has shown better self-improvement rate compare to centralized mode and provides primary and secondary immune response for unknown anomalies and zero-day attacks.
Abstract
This paper presents an intrusion detection system architecture based on the artificial immune system concept. In this architecture, an innate immune mechanism through unsupervised machine learning methods is proposed to primarily categorize network traffic to “self” and “non-self” as normal and suspicious profiles respectively. Unsupervised machine learning techniques formulate the invisible structure of unlabeled data without any prior knowledge. The novelty of this work is utilization of these methods in order to provide online and real-time training for the adaptive immune system within the artificial immune system. Different methods for unsupervised machine learning are investigated and DBSCAN (density-based spatial clustering of applications with noise) is selected to be utilized in this architecture. The adaptive immune system in our proposed architecture also takes advantage of the distributed structure, which has shown better self-improvement rate compare to centralized mode and provides primary and secondary immune response for unknown anomalies and zero-day attacks. The experimental results of proposed architecture is presented and discussed.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Network Intrusion Detection for IoT Security Based on Learning Techniques

TL;DR: This survey classifies the IoT security threats and challenges for IoT networks by evaluating existing defense techniques and provides a comprehensive review of NIDSs deploying different aspects of learning techniques for IoT, unlike other top surveys targeting the traditional systems.
Journal ArticleDOI

Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges

TL;DR: In this article, the authors provide an overview of unsupervised learning in the domain of networking, and provide a comprehensive review of the current state of the art in this area, by synthesizing insights from previous survey papers.
Journal ArticleDOI

Flow-based intrusion detection: techniques and challenges

TL;DR: A taxonomy for flow-based intrusion detection systems is proposed on the basis of the technique used for detection of maliciousness in flow records to identify important research challenges for future research in the area of flow- based intrusion detection.
Proceedings ArticleDOI

A deep auto-encoder based approach for intrusion detection system

TL;DR: The proposed DAE model is trained in a greedy layer-wise fashion in order to avoid overfitting and local optima, and provides substantial improvement over other deep learning-based approaches in terms of accuracy, detection rate and false alarm rate.
Journal ArticleDOI

From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods

TL;DR: This paper provides a comprehensive overview of unsupervised and hybrid methods for intrusion detection, discussing their potential in the domain and descant how IDS data could be used to reconstruct and correlate attacks to identify attackers, with the use of advanced data analytics techniques.
References
More filters
Journal ArticleDOI

The Danger Model: A Renewed Sense of Self

TL;DR: A model of immunity based on the idea that the immune system is more concerned with entities that do damage than with those that are foreign is outlined.
Proceedings ArticleDOI

Self-nonself discrimination in a computer

TL;DR: A method for change detection which is based on the generation of T cells in the immune system is described, which reveals computational costs of the system and preliminary experiments illustrate how the method might be applied to the problem of computer viruses.
Journal ArticleDOI

A survey of techniques for internet traffic classification using machine learning

TL;DR: This survey paper looks at emerging research into the application of Machine Learning techniques to IP traffic classification - an inter-disciplinary blend of IP networking and data mining techniques.
Journal ArticleDOI

The immune system, adaptation, and machine learning

TL;DR: A dynamical model for the immune system is described that is based on the network hypothesis of Jerne, and is simple enough to simulate on a computer, and has a strong similarity to an approach to learning and artificial intelligence introduced by Holland, called the classifier system.
Journal ArticleDOI

Computer immunology

TL;DR: A body of work on computational immune systems that behave analogously to the natural immune system and in some cases have been used to solve practical engineering problems such as computer security are described.
Related Papers (5)