Abstract:An adaptive immune wavelet network based intrusion detection model and the related algorithm are proposed by combining an adaptive wavelet network model with immune algorithm in this paper. The model not only avoids blindness of determing parameters and construction of neural network, but also alleviates sensitivity to initialization. The experimental results show detection rate acquired in this algorithm is higher than that in other algorithms and its convergency speed is higher than others’. Moreover, the relationship between False Negatives and False Positives can be restricted and balanced by adjusting a threshold value.
[1] Cohen W W. Fast Effective Rule Induction. In: Proc of the 12th International Conference on Machine Learning. Tahoe City, USA, 1995, 115-123 [2] Hofmeyr S A, Forrest S. Architecture for an Artificial Immune System. Evolutionary Computation, 2000, 8(4): 443-473 [3] Ghosh A K, Wanken J, Charron F. Detecting Anomalous and Unknown Intrusions against Programs. In: Proc of the Annual Computer Security Applications Conference. Scottsdale, USA, 1998, 259-267 [4] Ghosh A K, Michael C, Schatz M. A Real-Time Intrusion Detection System Based on Learning Program Behavior. In: Debar H, Mé L, Wu S F, eds. Recent Advances in Intrusion Detection. Heidelberg, Germany: Springer-Verlag, 2000, 93-109 [5] Lee W, Stolfo S J. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Trans on Information and System Security, 2000, 3(4): 227-261 [6] Rao X, Dong C X,Yang S Q. An Intrusion Detection System Based on Support Vector Machine. Journal of Software, 2003, 14(4): 798-803 (in Chinese) (饶 鲜,董春曦,杨绍全.基于支撑向量机的入侵检测系统.软件学报, 2003, 14(4): 798-803) [7] Zhang Q H, Benveniste A. Wavelet Networks. IEEE Trans on Neural Networks, 1992, 3(6): 889-898 [8] Zhang Q H. Using Wavelet Network in Nonparametric Estimation. IEEE Trans on Neural Networks, 1997, 8(2): 227-236 [9] Yao X. Evolving Artificial Neural Networks. Proc of the IEEE, 1999, 87(9): 1423-1447 [10]Wang L, Pan J, Jiao L C. The Immune Algorithm. Acta Electronica Sinica, 2000, 28(7): 74-78 (in Chinese) (王 磊,潘 进,焦李成.免疫算法.电子学报, 2000, 28(7): 74-78) [11]Wang L, Pan J, Jiao L C. The Evolutional Algorithm Based on the Immune Strategy. Progress in Natural Science, 2000, 10(5): 451-455(in Chinese) (王 磊,潘 进,焦李成.基于免疫策略的进化算法.自然科学进展, 2000, 10(5): 451-455) [12]Su P R, Li D Q, Feng D G. A Host-Based Anomaly Intrusion Detection Model Based on Genetic Programming. Journal of Software, 2003, 14(6): 1120-1126 (in Chinese) (苏璞睿,李德全,冯登国.基于基因规划的主机异常入侵检测模型.软件学报, 2003, 14(6): 1120-1126) [13]Warrender C, Forrest S, Pearlmutter B A. Detecting Intrusions Using System Calls: Alternative Data Models. In: Proc of the IEEE Symposium on Security and Privacy. Oakland, USA, 1999, 133-145