Keywords: intrusion detection system, artificial immune system, kdd99, information security, network security, network attack
INTELLIGENT NETWORK INTRUSION DETECTION SYSTEM BASED ON ARTIFICIAL IMMUNE SYSTEM MECHANISMS
UDC 004.056
DOI: 10.26102/2310-6018/2019.24.1.010
The article is devoted to the problem of detecting network attacks, both known and previously unknown. The application of various methods of artificial intelligence in the scientific literature to solve this problem was analyzed. The advantages of the artificial immune system were revealed. Its main mechanisms including artificial lymphocytes generation, negative selection, clonal selection, data analysis, and periodic renewal of lymphocytes were analyzed. The article describes the developed intrusion detection system based on artificial immune system. Developed system includes a sniffing subsystem, so that allows it to analyze real data of host network connections. The article also describes network connections dataset KDD99, which used to efficiency evaluation of developed system. The methods of compressing the initial dataset proposed in the scientific literature were analyzed, and the drawbacks of these methods were identified. This article describes the experimental determination of the network connections significant parameters contained in the dataset. The authors identified 13 significant parameters from 41, and also they described the process of preliminary processing and preparation of the analyzed data, a series of experiments. The results of the experiments showed the high efficiency of the developed system in detecting unknown network attacks, detecting and classifying known attacks.
1. Vasilyev V. I., Shamsutdinov R. R. Distributed Intrusion Detection System Based on Immune System Mechanisms, Information Technologies for Intelligent Decision Making Support, vol. 1, Ufa, 28-31 may 2018, pp. 237- 244. (in Russian).
2. Kornev P. A., Pylkin A. N., Sviridov A. U. Using artificial intelligence in intrusion detection systems, Modern Problems of Science and Education, 2014, no. 6, pp. 135-143. (in Russian).
3. Branitsky A. A., Kotenko A. V. Analysis and Classification of Methods for Network Attack Detection, SPIIRAS Proceedings, St. Peterburg, 2016, no 2, pp. 207-244. (in Russian).
4. Zhigulin P.V., Podvorchan D. E. Analysis of network traffic on the basis of neural networks, Elektronnye sredstva i sistemy upravleniya [Electronic Tools and Control Systems], 2013, no. 2, pp. 44-48. (in Russian).
5. Shanmugavadivu R., Nagarajan N. Network intrusion detection system using fuzzy logic // Indian Journal of Computer Science and Engineering [Electronic resource]. URL: http://www.ijcse.com/docs/IJCSE11-02-01-034.pdf (accessed 29.03.2018).
6. Slepovichev I.I., Irmatov P.V., Komarova M.S., Bezhin A.A. DDos attack detection using fuzzy neural network, Izvestiya Saratovskogo universiteta. Seriya Matematika. Mekhanika. Informatika [News of Saratov University. Series: Mathematics. Mechanics. Informatics], 2009, no. 9, pp. 84-89. (In Russian).
7. Goyal A., Kumar C. GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System // Northwestern University [Electronic resource]. URL: http://www.cs.northwestern.edu/~ago210/ganids/GANIDS.pdf (accessed 29.03.2018).
8. Al-Enezi J.R., Abbod M.F., Alsharhan S. Artificial Immune Systems – Models, Algorithms and Applications // IJRRAS. – Vol. 2. – № 3. – 2010. – pp. 118-131.
9. Bachmayer S. Artificial Immune Systems // Tietojenkäsittelytieteen laitos. [Electronic resource]. URL: https://www.cs.helsinki.fi/u/niklande/opetus/SemK07/paper/bachmayer.pdf (accessed 01.03.2018).
10. Tarakanov A.O., Tarakanov Y.A. A comparison of immune and genetic algorithms for two real-life tasks of pattern recognition // Int. J. of Unconventional Computing. – Vol. 1.4. – 2004. – pp. 357-374.
11. Tarakanov A.O., Tarakanov Y.A. A comparison of immune and neural computing for two real-life tasks of pattern recognition // International Conference on Artificial Immune Systems. – Catania, 2004. – pp. 236-249.
12. Vasilyev V.I., Kotov V.D. Network Attacks Detection System Based on the Mechanisms of Immune Model, Izvestiya YUFU. Tekhnicheskie nauki [News of SFedU. Technical Science], Taganrog, 2011, no. 12, pp. 180-189. (in Russian).
13. De Castro L.N., Von Zuben F.J. Learning and optimization using the clonal selection principle // IEEE Transactions on Evolutionary Computation. – Vol. 6. – № 3. – 2002. – pp. 239-251.
14. Vasilyev V. I. Intellektual'nye sistemy zashchity informacii [Intelligent information security systems], in Vasilyev V.I. (ed.), Innovacionnoe mashinostroenie Publ., Moscow, 2017, 201 p. (in Russian).
15. KDD Cup 1999 Data [Electronic resource]. URL: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed 05.02.2018).
16. Zaind A., Maarof M., Shamsnddin S., Abraham A. Ensamble of One-class Classifier for Network Intrusion Detections. [Electronic resource]. URL: http://www.softcomputing.net/ias08_1.pdf (accessed 29.02.2018).
17. Mukkamala S., Sung A.H. Identifying Significant Features for Network Forensic Analysis using Artificial Intelligent Techniques // International Journal of Digital Evidence. – Vol. 1. – Issue 4. – 2003. – P. 1-17.
18. Mukkamala S., Sung A.H., Abraham A. Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. [Electronic resource]. URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.544&rep=rep1 &type=pdf (accessed 29.02.2018).
19. Chou T.S., Yen K.K., LNO J. Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms // International Journal Of Computational Intelligence. – Vol. 4. – № 3. – 2008. – pp. 196-208.
20. Meshcheryakov R.V., Khodashinsky I.A., Gusakova E.N. Evaluation of feature space for intrusion detection system // Izvestiya YUFU. Tekhnicheskie nauki [News of SFedU. Technical Science], Taganrog, 2013, no. 12, pp. 57- 63. (in Russian).
21. Vitkova L.A. Study on distributed computer systems adaptive actions, H&ES Research, 2015, vol. 7, no. 5, pp. 44-48. (in Russian).
22. Ushakov S. A. Development and research of algorithms for solving recognition problems based on artificial immune systems, Abstract of Ph.D. dissertation, Theoretical foundations of computer science, Voronezh State University, Voronezh, Russian Federation, 2015. (in Russian).
23. Distributed attack detection systems, System-Repair, available at: http://systemrepair.net/2012/05/raspredelennye-sistemy-obnaruzheniya-atak/ (accessed 31.03.2018). (in Russian).
Keywords: intrusion detection system, artificial immune system, kdd99, information security, network security, network attack
For citation: Vasiliev V.I., Shamsutdinov R.R. INTELLIGENT NETWORK INTRUSION DETECTION SYSTEM BASED ON ARTIFICIAL IMMUNE SYSTEM MECHANISMS. Modeling, Optimization and Information Technology. 2019;7(1). URL: https://moit.vivt.ru/wp-content/uploads/2019/01/VasilyevShamsutdinov_1_19_1.pdf DOI: 10.26102/2310-6018/2019.24.1.010 (In Russ).
Published 31.03.2019