ИНТЕЛЛЕКТУАЛЬНАЯ СИСТЕМА ОБНАРУЖЕНИЯ СЕТЕВЫХ АТАК НА ОСНОВЕ МЕХАНИЗМОВ ИСКУССТВЕННОЙ ИММУННОЙ СИСТЕМЫ
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

INTELLIGENT NETWORK INTRUSION DETECTION SYSTEM BASED ON ARTIFICIAL IMMUNE SYSTEM MECHANISMS

Vasiliev V.I.,  Shamsutdinov R.R. 

UDC 004.056
DOI: 10.26102/2310-6018/2019.24.1.010

  • Abstract
  • List of references
  • About authors

The article is devoted to the problem of detecting network attacks, both known and previously unknown. The application of various methods of artificial intelligence in the scientific literature to solve this problem was analyzed. The advantages of the artificial immune system were revealed. Its main mechanisms including artificial lymphocytes generation, negative selection, clonal selection, data analysis, and periodic renewal of lymphocytes were analyzed. The article describes the developed intrusion detection system based on artificial immune system. Developed system includes a sniffing subsystem, so that allows it to analyze real data of host network connections. The article also describes network connections dataset KDD99, which used to efficiency evaluation of developed system. The methods of compressing the initial dataset proposed in the scientific literature were analyzed, and the drawbacks of these methods were identified. This article describes the experimental determination of the network connections significant parameters contained in the dataset. The authors identified 13 significant parameters from 41, and also they described the process of preliminary processing and preparation of the analyzed data, a series of experiments. The results of the experiments showed the high efficiency of the developed system in detecting unknown network attacks, detecting and classifying known attacks.

1. Vasilyev V. I., Shamsutdinov R. R. Distributed Intrusion Detection System Based on Immune System Mechanisms, Information Technologies for Intelligent Decision Making Support, vol. 1, Ufa, 28-31 may 2018, pp. 237- 244. (in Russian).

2. Kornev P. A., Pylkin A. N., Sviridov A. U. Using artificial intelligence in intrusion detection systems, Modern Problems of Science and Education, 2014, no. 6, pp. 135-143. (in Russian).

3. Branitsky A. A., Kotenko A. V. Analysis and Classification of Methods for Network Attack Detection, SPIIRAS Proceedings, St. Peterburg, 2016, no 2, pp. 207-244. (in Russian).

4. Zhigulin P.V., Podvorchan D. E. Analysis of network traffic on the basis of neural networks, Elektronnye sredstva i sistemy upravleniya [Electronic Tools and Control Systems], 2013, no. 2, pp. 44-48. (in Russian).

5. Shanmugavadivu R., Nagarajan N. Network intrusion detection system using fuzzy logic // Indian Journal of Computer Science and Engineering [Electronic resource]. URL: http://www.ijcse.com/docs/IJCSE11-02-01-034.pdf (accessed 29.03.2018).

6. Slepovichev I.I., Irmatov P.V., Komarova M.S., Bezhin A.A. DDos attack detection using fuzzy neural network, Izvestiya Saratovskogo universiteta. Seriya Matematika. Mekhanika. Informatika [News of Saratov University. Series: Mathematics. Mechanics. Informatics], 2009, no. 9, pp. 84-89. (In Russian).

7. Goyal A., Kumar C. GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System // Northwestern University [Electronic resource]. URL: http://www.cs.northwestern.edu/~ago210/ganids/GANIDS.pdf (accessed 29.03.2018).

8. Al-Enezi J.R., Abbod M.F., Alsharhan S. Artificial Immune Systems – Models, Algorithms and Applications // IJRRAS. – Vol. 2. – № 3. – 2010. – pp. 118-131.

9. Bachmayer S. Artificial Immune Systems // Tietojenkäsittelytieteen laitos. [Electronic resource]. URL: https://www.cs.helsinki.fi/u/niklande/opetus/SemK07/paper/bachmayer.pdf (accessed 01.03.2018).

10. Tarakanov A.O., Tarakanov Y.A. A comparison of immune and genetic algorithms for two real-life tasks of pattern recognition // Int. J. of Unconventional Computing. – Vol. 1.4. – 2004. – pp. 357-374.

11. Tarakanov A.O., Tarakanov Y.A. A comparison of immune and neural computing for two real-life tasks of pattern recognition // International Conference on Artificial Immune Systems. – Catania, 2004. – pp. 236-249.

12. Vasilyev V.I., Kotov V.D. Network Attacks Detection System Based on the Mechanisms of Immune Model, Izvestiya YUFU. Tekhnicheskie nauki [News of SFedU. Technical Science], Taganrog, 2011, no. 12, pp. 180-189. (in Russian).

13. De Castro L.N., Von Zuben F.J. Learning and optimization using the clonal selection principle // IEEE Transactions on Evolutionary Computation. – Vol. 6. – № 3. – 2002. – pp. 239-251.

14. Vasilyev V. I. Intellektual'nye sistemy zashchity informacii [Intelligent information security systems], in Vasilyev V.I. (ed.), Innovacionnoe mashinostroenie Publ., Moscow, 2017, 201 p. (in Russian).

15. KDD Cup 1999 Data [Electronic resource]. URL: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed 05.02.2018).

16. Zaind A., Maarof M., Shamsnddin S., Abraham A. Ensamble of One-class Classifier for Network Intrusion Detections. [Electronic resource]. URL: http://www.softcomputing.net/ias08_1.pdf (accessed 29.02.2018).

17. Mukkamala S., Sung A.H. Identifying Significant Features for Network Forensic Analysis using Artificial Intelligent Techniques // International Journal of Digital Evidence. – Vol. 1. – Issue 4. – 2003. – P. 1-17.

18. Mukkamala S., Sung A.H., Abraham A. Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. [Electronic resource]. URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.544&rep=rep1 &type=pdf (accessed 29.02.2018).

19. Chou T.S., Yen K.K., LNO J. Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms // International Journal Of Computational Intelligence. – Vol. 4. – № 3. – 2008. – pp. 196-208.

20. Meshcheryakov R.V., Khodashinsky I.A., Gusakova E.N. Evaluation of feature space for intrusion detection system // Izvestiya YUFU. Tekhnicheskie nauki [News of SFedU. Technical Science], Taganrog, 2013, no. 12, pp. 57- 63. (in Russian).

21. Vitkova L.A. Study on distributed computer systems adaptive actions, H&ES Research, 2015, vol. 7, no. 5, pp. 44-48. (in Russian).

22. Ushakov S. A. Development and research of algorithms for solving recognition problems based on artificial immune systems, Abstract of Ph.D. dissertation, Theoretical foundations of computer science, Voronezh State University, Voronezh, Russian Federation, 2015. (in Russian).

23. Distributed attack detection systems, System-Repair, available at: http://systemrepair.net/2012/05/raspredelennye-sistemy-obnaruzheniya-atak/ (accessed 31.03.2018). (in Russian).

Vasiliev Vladimir Ivanovich
Doctor of Technical Sciences
Email: vasilyev@ugatu.ac.ru

Ufa State Aviation Technical University

Ufa, Russian Federation

Shamsutdinov Rinat Rustemovich

Email: shamsutdinov.rinat.r@gmail.com

Ufa State Aviation Technical University

Ufa, Russian Federation

Keywords: intrusion detection system, artificial immune system, kdd99, information security, network security, network attack

For citation: Vasiliev V.I., Shamsutdinov R.R. INTELLIGENT NETWORK INTRUSION DETECTION SYSTEM BASED ON ARTIFICIAL IMMUNE SYSTEM MECHANISMS. Modeling, Optimization and Information Technology. 2019;7(1). URL: https://moit.vivt.ru/wp-content/uploads/2019/01/VasilyevShamsutdinov_1_19_1.pdf DOI: 10.26102/2310-6018/2019.24.1.010 (In Russ).

889

Full text in PDF

Published 31.03.2019