UDK 004.056
THE DETECTION OF NETWORK INTRUSION BY EVOLUTIONARY IMMUNE ALGORITHM WITH CLONAL SELECTION
V. G. Zhukov, T. A. Salamatova
Siberian State Aerospace University named after academician M. F. Reshetnev 31, Krasnoyarsky Rabochy Av., Krasnoyarsk, 660014, Russian Federation E-mail: zhukov.sibsau@gmail.com, Shiracom@mail.ru
In the paper the application of artificial immune systems as a heuristic detection method for algorithmic information security incidents of intrusion detection systems is proposed. A theory of clonal selection has been selected from the existing computational models of artificial immune systems with the necessary features for building adaptive intrusion detection systems. The efficiency of clonal selection algorithm is increased (forming high affinity detectors) by modification of clonal selection algorithm by applying an external structure optimization, which principle is based on the application of the evolutionary algorithm strategy. For affinity calculation in work the metrics “coordination percent” is used. Additionally, in the paper the pseudorandom numbers generator on the basis of Blum–Blum–Shub’s algorithm is applied. The empirical results of the evolutionary immune clonal selection algorithm effectiveness have been received by testing on a set of test data according to the procedure of research. Comparative analysis with similar efficiency of the developed evolutionary immune clonal selection algorithm, constructed on the other methods of artificial intelligence, is performed. Conclusions on the efficiency of application of the evolutionary immune clonal selection algorithm selection at the solution of a problem of deliberate changes detection on a controlled data are formulated according to the results of the research.
intrusion detection system, artificial immune systems, clonal selection algorithm, evolutionary strategy.
References
  1. Dewan Md. F, Rahman M. Z., Rahman Ch. M. Mining. Mining Complex Network Data for Adaptive Intrusion Detection. Data Mining. Book 2. August, 2012.
  2. H. Yang, T. Li, X. Hu, F. Wang, Y. Zou1. A Survey of Artificial Immune System Based Intrusion Detection. The Scientific World Journal. 2014.
  3. Dasgupta D. Iskusstvennye immunnye sistemy i ikh primenenie [Artificial Immune Systems and Their Applications]. Moscow, FIZMATLIT Publ., 2006, 344 p.
  4. Burnet F. M. A. Modification of Jerne’s Theory of Antibody Production Using the Concept of Clonal Selection. Australian Journal of Science 20, 1957, p. 67–69.
  5. Talmage D. W. Allergy and Immunology. Annual Review of Medicine 8, 1957, p. 239–256.
  6. De Castro L., Von Zuben F. The clonal selection algorithm with engineering applications Proc. of GECCO’00, Workshop on Artificial Immune Systems and Their Applications, Las Vegas, 2000, p. 36–37.
  7. Zhukov V. G., Salamatova T. A. [The effective application of the artificial immune system algorithms with clonal selection in the task of information security incidents automated detection]. Materialy XVII Mezhdunarodnoy nauchnoy konferentsii “Reshetnevskie chteniya” [Proc. of the XVIIth International Scientific Conference “Reshetnev readings”], Krasnoyarsk, 2013, р. 290–292 (In Russ.).
  8. Zhukov V. G., Salamatova T. A. [Detection of information security incidents modified algorithm of artificial immune system with clonal selection]. V mire naychnikh otkritii (In the World of Scientific Discoveries), Krasnoyarsk, 2014, № 6.1 (54), p. 497–517 (In Russ.).
  9. Blum L., Blum M., Shub M. A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing, 1986, vol. 15, p. 364–383.
  10. KDD Сup 99 Intrusion detection data set. Available at: http://kdd.ics.uci.edu/ (accessed 21 August 2014).
  11. Mukkamala S., Janoski G., Intrusion Detection: Support Vector Machines and Neural Networks. Sung A. Intrusion Detection: Support Vector Machines and Neural Networks. Available at: http://www.cs.uiuc.edu/ class/fa05/cs591han/papers/mukkCNN02.pdf (accessed 20 August 2014).
  12. Gardner M. The Binary Gray Code. Ch. 2 in Knotted Doughnuts and Other Mathematical Entertainments, New York: W. H. Freeman, 1986.
  13. Tehnologii obnaruzheniya setevih atak. [Technology for network attacks detecting.] Available at: http://bstu.by/~opo/ru/uni/bstu/science/ids/ (accessed 10 September 2014).
  14. Bryukhovetskiy A. A., Skatkov A. V., Berezenko P. O. [Detection of vulnerabilities in critical applications on the basis of decision trees. Recent developments in applied mathematics, computer science, automation]. Materialy 3 mezhdunarodnogo nauchno-tekhnicheskogo seminara “Sovremennie problemi prikladnoi matimatiki, informatiki, avtomatizacii, upravlenia” [Proc. of the 3rd International Scientific and Technical Workshop “Recent developments in applied mathematics, computer science, automation”], Moscow, 2013, p. 54–62 (In Russ.).
  15. Shirazi H. M., Namadchian A., Tehranikhalili A. A. Combined anomaly base intrusion detection using memetic algorithm and bayesian networks. International journal of machine learning and computing, vol. 2, no. 5, October 2012, p. 706–710.

Zhukov Vadim Genadjevich – Cand. Sc.-Ing., Docent, Docent of the Information technology security department, Siberian State Aerospace University named after academician M. F. Reshetnev. E-mail: zhukov.sibsau@gmail.com

Salamatova Tatyana Andreevna – Master’s Degree student, Siberian State Aerospace University named after academician M. F. Reshetnev. E-mail: shiracom@mail.ru