CFP last date
20 May 2024
Reseach Article

A Cooperative Negative Selection Algorithm for Anomaly Detection

by Praneet Saurabh, Bhupendra Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 17
Year of Publication: 2014
Authors: Praneet Saurabh, Bhupendra Verma
10.5120/16688-6809

Praneet Saurabh, Bhupendra Verma . A Cooperative Negative Selection Algorithm for Anomaly Detection. International Journal of Computer Applications. 95, 17 ( June 2014), 27-32. DOI=10.5120/16688-6809

@article{ 10.5120/16688-6809,
author = { Praneet Saurabh, Bhupendra Verma },
title = { A Cooperative Negative Selection Algorithm for Anomaly Detection },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 17 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number17/16688-6809/ },
doi = { 10.5120/16688-6809 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:42.676266+05:30
%A Praneet Saurabh
%A Bhupendra Verma
%T A Cooperative Negative Selection Algorithm for Anomaly Detection
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 17
%P 27-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Artificial Immune System (AIS) is a convoluted and complex arrangement derived from biological immune system (BIS). It possesses the abilities of self-adapting, self-learning and self-configuration. It has the basic function to distinguish self and non-self. Negative Selection Algorithm (NSA) over the years has shown to be competent for anomaly detection problems. In the past decade internet has popularized and proliferated into our lives immensely. Internet attack cases are increasing with different and new attack methods. This paper presents a Cooperative Negative Selection Algorithm (CNSA) for Anomaly Detection by integrating a novel detector selection strategy and voting between them to effectively identify anomaly. New introduced mechanisms in CNSA enable it to cover more self region correctly and efficiently. It also reduces computational complexities. Experimental results show high anomaly detection rate with less false positive alarm and low overhead in most of the cases.

References
  1. B. Mukerjee, L. T. Heberlein, K. N. Levitt, "Network Intrusion Detection", IEEE Network, Vol. 8, No. 3, 1994, pp 26-41.
  2. Charles Cresson Wood, "The Human Immune System as an Information Systems Security Reference Model", Computers and Security, Elsevier Vol. 6, 1987, pp- 511-516.
  3. D. E. Denning, "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, Vol. 13, No. 2, February 1987, pp. 222-232.
  4. F. Esponda, S. Forrest, P. Helman, "A Formal Framework for Positive and Negative Detection schemes", IEEE Transactions on System, Man and Cybernetics, Vol. 34, No. 1, 2003, pp 357-373.
  5. F. A. Gonzalez, D. Dasgupta, "Anomaly Detection Using Real-Valued Negative Selection", Genetic Programming and Evolvable Machine,Vol. 4. No. 4, 2003, pp. 383-403.
  6. Hiroyuki Nishiyama and Fumio Mizoguchi, "Design of Security System Based on Immune System", pp 138-143, IEEE 2001.
  7. Mark Burgess, "Biology, Immunology and Information security", Information Security Technical Report, Science Direct, Vol. 12, 2007, pp 192–199.
  8. N. K. Jerne, "Towards a network theory of the immune system", Ann. Immunol. (Paris), 125C, 1974, pp. 373-389.
  9. P. Saurabh, B. Verma, S. Sharma, "Biologically Inspired Computer Security System: The Way Ahead", SNDS, Communications in Computer and Information Science, Vol, 335, Springer, 2012, pp. 474-484.
  10. Richard E. Overil, "Computational immunology and anomaly detection", Information Security Technical Report, Science Direct, Vol. 12, 2007, pp 188-191.
  11. S. Forrest, A. S. Perelson, L. Allen, R. Cherukuri, "Self-nonself discrimination in a computer", IEEE Symposium on Research in Security and Privacy, 1994, pp. 202–212.
  12. S. Forrest, S. A. Hofmeyr, A. Somayaji, "Computer Immunology," Communications of the ACM, Vol. 40, No. 10, 1997, pp. 88–96.
  13. S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff , "A sense of self for Unix processes", Proceedings IEEE Symposium on Security and Privacy, 1996, pp 120-128.
  14. S. Ramakrishnan, S. Srinivasan,. "Intelligent agent based artificial immune system for computer security—a review", Artificial Intelligence Review, Vol. 32, No. 1-4, December 2009, pp 13–43
  15. W. Wang, X. Guan, X. L. Zhang, Processing of massive audit data streams for real-time anomaly intrusion detection", Computer Communications, Vol. 31, No. 1, 2008, pp. 58–72
  16. StatLib-datasets archive. http://lib. stat. cmu. edu/dataset/
Index Terms

Computer Science
Information Sciences

Keywords

Artificial Immune System Biological Immune System Negative Selection Algorithm Anomaly