[Home ] [Archive]   [ فارسی ]  
:: Main :: Archive :: About :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Volume 2, Issue 1 (1-2019) ::
C4I Journal 2019, 2(1): 26-49 Back to browse issues page
Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system
Hossein Shirazi * , Ehsan Farzadnia , Alireza Norouzi
Abstract:   (5063 Views)
In recent years, research works in field of the network security have been directed to inspire from biological immune system so as to solve complex problems.  Artificial immune system (AIS) and its applied immunity potential with prerequisite for bio defense, is always involved as a method for organization’ security control and network anomaly detection.  In this research, different immunity methods in comparison with other machine learning and meta-heuristic algorithms have been analyzed for our main purpose; that is to provide a novel approach for solving the intrusion detection.  All of evaluations accomplished on WEKA data mining tool v3.6 under NSL-KDD dataset.  Results of experiment show that the AIS methods ARIS2Parallel, Immunos99 and CSCA cause to enhance in accuracy rates sensibly after feature selection phase was embedded to them. So, approach of Bat+ARIS2Parallel with correlation coefficient of 0.946, detection rate of 0.973, accuracy rate of 0.9725 and false positive rate of 0.028  has obtained an idealistic classification compared to other approaches in tests.  Since it has high cc rate, it seems that is reliable to be used in researches for IDS developments in future.
Keywords:   Intrusion detection, feature selection, meta-heuristic algorithms, artificial immune system, information gain. 
Keywords: Intrusion detection, feature selection, meta-heuristic algorithms, artificial immune system, information gain
Full-Text [PDF 1924 kb]   (1991 Downloads)    
Type of Study: Research | Subject: Special
Received: 2018/04/9 | Accepted: 2018/06/2 | Published: 2019/01/14
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Shirazi H, Farzadnia E, Norouzi A. Scrutinizing and evaluating intrusion detection approaches based on the artificial immune system. C4I Journal 2019; 2 (1) :26-49
URL: http://ic4i-journal.ir/article-1-23-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 2, Issue 1 (1-2019) Back to browse issues page
فصلنامه علمی-پژوهشی فرماندهی و کنترل C4I Journal

 
Persian site map - English site map - Created in 0.05 seconds with 37 queries by YEKTAWEB 4645