Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Cooperative Negative Selection Algorithm for Anomaly Detection

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 95 - Number 17
Year of Publication: 2014
Authors:
Praneet Saurabh
Bhupendra Verma
10.5120/16688-6809

Praneet Saurabh and Bhupendra Verma. Article: A Cooperative Negative Selection Algorithm for Anomaly Detection. International Journal of Computer Applications 95(17):27-32, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Praneet Saurabh and Bhupendra Verma},
	title = {Article: A Cooperative Negative Selection Algorithm for Anomaly Detection},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {95},
	number = {17},
	pages = {27-32},
	month = {June},
	note = {Full text available}
}

Abstract

Artificial Immune System (AIS) is a convoluted and complex arrangement derived from biological immune system (BIS). It possesses the abilities of self-adapting, self-learning and self-configuration. It has the basic function to distinguish self and non-self. Negative Selection Algorithm (NSA) over the years has shown to be competent for anomaly detection problems. In the past decade internet has popularized and proliferated into our lives immensely. Internet attack cases are increasing with different and new attack methods. This paper presents a Cooperative Negative Selection Algorithm (CNSA) for Anomaly Detection by integrating a novel detector selection strategy and voting between them to effectively identify anomaly. New introduced mechanisms in CNSA enable it to cover more self region correctly and efficiently. It also reduces computational complexities. Experimental results show high anomaly detection rate with less false positive alarm and low overhead in most of the cases.

References

  • B. Mukerjee, L. T. Heberlein, K. N. Levitt, "Network Intrusion Detection", IEEE Network, Vol. 8, No. 3, 1994, pp 26-41.
  • Charles Cresson Wood, "The Human Immune System as an Information Systems Security Reference Model", Computers and Security, Elsevier Vol. 6, 1987, pp- 511-516.
  • D. E. Denning, "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, Vol. 13, No. 2, February 1987, pp. 222-232.
  • F. Esponda, S. Forrest, P. Helman, "A Formal Framework for Positive and Negative Detection schemes", IEEE Transactions on System, Man and Cybernetics, Vol. 34, No. 1, 2003, pp 357-373.
  • F. A. Gonzalez, D. Dasgupta, "Anomaly Detection Using Real-Valued Negative Selection", Genetic Programming and Evolvable Machine,Vol. 4. No. 4, 2003, pp. 383-403.
  • Hiroyuki Nishiyama and Fumio Mizoguchi, "Design of Security System Based on Immune System", pp 138-143, IEEE 2001.
  • Mark Burgess, "Biology, Immunology and Information security", Information Security Technical Report, Science Direct, Vol. 12, 2007, pp 192–199.
  • N. K. Jerne, "Towards a network theory of the immune system", Ann. Immunol. (Paris), 125C, 1974, pp. 373-389.
  • P. Saurabh, B. Verma, S. Sharma, "Biologically Inspired Computer Security System: The Way Ahead", SNDS, Communications in Computer and Information Science, Vol, 335, Springer, 2012, pp. 474-484.
  • Richard E. Overil, "Computational immunology and anomaly detection", Information Security Technical Report, Science Direct, Vol. 12, 2007, pp 188-191.
  • S. Forrest, A. S. Perelson, L. Allen, R. Cherukuri, "Self-nonself discrimination in a computer", IEEE Symposium on Research in Security and Privacy, 1994, pp. 202–212.
  • S. Forrest, S. A. Hofmeyr, A. Somayaji, "Computer Immunology," Communications of the ACM, Vol. 40, No. 10, 1997, pp. 88–96.
  • S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff , "A sense of self for Unix processes", Proceedings IEEE Symposium on Security and Privacy, 1996, pp 120-128.
  • S. Ramakrishnan, S. Srinivasan,. "Intelligent agent based artificial immune system for computer security—a review", Artificial Intelligence Review, Vol. 32, No. 1-4, December 2009, pp 13–43
  • W. Wang, X. Guan, X. L. Zhang, Processing of massive audit data streams for real-time anomaly intrusion detection", Computer Communications, Vol. 31, No. 1, 2008, pp. 58–72
  • StatLib-datasets archive. http://lib. stat. cmu. edu/dataset/