An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
An immunity-based technique to characterize intrusions in computernetworks
IEEE Transactions on Evolutionary Computation
Hi-index | 0.00 |
Traditional intrusion detection system is confronted with the pressure of processing massive network traffic data which increases sharply. Besides, its feature of static detection causes the weak adaptability for the network environment. To overcome the former problems, an architecture for network intrusion detection based on cloud computing and artificial immune principle is proposed. It consists of local intrusion detection sub-system and cloud computing platform which provides the services of intrusion detection. The local intrusion detection sub-system captures and simply preprocesses the network traffics. The cloud computing platform deals with the true transactions of intrusion detection. It interacts with the local intrusion detection sub-system through standard service interface and responds the intrusion detection requests of the local intrusion detection sub-system. Furthermore, it simulates the good features of artificial immune principle and adopts self-learning mechanism to evolve intrusion detection elements to make the proposed architecture adaptive for the real network environment.