𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Application of Artificial Immune System Algorithms for Intrusion Detection


Tongue
English
Leaves
652
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Intrusion Detection (ID) is one of the most challenging problems in today’s era of computer security. New innovative ideas are used by the hackers to break the security, hence the challenge for developing better ID systems are increasing day-by-day. In this paper, we applied the Artificial Immune System (AIS) based classifiers for intrusion detection. Each classifier is evaluated based on high accuracy and detection Read more...


Abstract: Intrusion Detection (ID) is one of the most challenging problems in today’s era of computer security. New innovative ideas are used by the hackers to break the security, hence the challenge for developing better ID systems are increasing day-by-day. In this paper, we applied the Artificial Immune System (AIS) based classifiers for intrusion detection. Each classifier is evaluated based on high accuracy and detection rate with low false alarm rate. The results are compared using percentage split (80%) and cross validation (10 fold) test options basing on two nominal target attributes i.e. type of attacks and protocol types having 5 and 3 sub-classes respectively. The experimental results indicate that the performance of CSCA (clonal selection classification algorithm) is better AIS based classifier for network based Intrusion Detection

✦ Table of Contents


Front Matter ....Pages I-XXXI
Front Matter ....Pages 1-1
Protein Function Prediction from Protein Interaction Network Using Bottom-up L2L Apriori Algorithm (Abhimanyu Prasad, Sovan Saha, Piyali Chatterjee, Subhadip Basu, Mita Nasipuri)....Pages 3-16
QSAR Model for Mast Cell Stabilizing Activity of Indolecarboxamidotetrazole Compounds on Human Basophils (Anamika Basu, Anasua Sarkar, Piyali Basak)....Pages 17-29
Integrated Classifier: A Tool for Microarray Analysis (Shib Sankar Bhowmick, Indrajit Saha, Luis Rato, Debotosh Bhattacharjee)....Pages 30-43
Study and Analysis of a Fast Moving Cursor Control in a Multithreaded Way in Brain Computer Interface (Debashis Das Chakladar, Sanjay Chakraborty)....Pages 44-56
A New Approach for Clustering Gene Expression Data (Girish Chandra, Sudhakar Tripathi)....Pages 57-64
Prediction of Diabetes Type-II Using a Two-Class Neural Network (Somnath Rakshit, Suvojit Manna, Sanket Biswas, Riyanka Kundu, Priti Gupta, Sayantan Maitra et al.)....Pages 65-71
Front Matter ....Pages 73-73
Design of Two-Bit Gray Code Counter Using Two-Dimensional Two-Dot One-Electron QCA (Kakali Datta, Debarka Mukhopadhyay, Paramartha Dutta)....Pages 75-84
A Study on Structural Benefits of Square Cells over Rectangular Cells in Case of 2Dot 1Electron QCA Cells (Mili Ghosh, Debarka Mukhopadhyay, Paramartha Dutta)....Pages 85-96
A Flower Pollination Algorithm Based Task Scheduling in Cloud Computing (Indrajeet Gupta, Amar Kaswan, Prasanta K. Jana)....Pages 97-107
An Efficient Design of Left Shifter in Quantum Cellular Automata (Biplab Das, Debashis De, Jadav Chandra Das, Sagar Sarkar)....Pages 108-120
Nano-Router Design for Nano-Communication in Single Layer Quantum Cellular Automata (Biplab Das, Jadav Chandra Das, Debashis De, Avijit Kumar Paul)....Pages 121-133
Front Matter ....Pages 135-135
Graph Based Clinical Decision Support System Using Ontological Framework (Nilanjana Lodh, Jaya Sil, Indrani Bhattacharya)....Pages 137-152
Use of Possibility Measures for Ranking of Interval Valued Intuitionistic Fuzzy Numbers in Solving Multicriteria Decision Making Problems (Samir Kumar, Animesh Biswas)....Pages 153-167
Music Classification Based on Genre and Mood (Ayush Shakya, Bijay Gurung, Mahendra Singh Thapa, Mehang Rai, Basanta Joshi)....Pages 168-183
Shape-based Fruit Recognition and Classification (Susovan Jana, Ranjan Parekh)....Pages 184-196
An Efficient Fragmented Plant Leaf Classification Using Color Edge Directivity Descriptor (Jyotismita Chaki, Ranjan Parekh, Samar Bhattacharya)....Pages 197-211
K-NN Based Text Segmentation from Digital Images Using a New Binarization Scheme (Ranjit Ghoshal, Sayan Das, Aditya Saha)....Pages 212-225
Comparative Analysis of Structured and Un-Structured Databases (Anindita Sarkar Mondal, Madhupa Sanyal, Samiran Chattopadhyay, Kartick Chandra Mondal)....Pages 226-241
SysML Based Conceptual ETL Process Modeling (Neepa Biswas, Samiran Chattopadhyay, Gautam Mahapatra, Santanu Chatterjee, Kartick Chandra Mondal)....Pages 242-255
Load Balancing of Unbalanced Matrix with Hungarian Method (Ranjan Kumar Mondal, Payel Ray, Enakshmi Nandi, Biswajit Biswas, Manas Kumar Sanyal, Debabrata Sarddar)....Pages 256-270
The Image Recognition System for Terrestrial Reconnaissance (Fuangfar Pensiri, Chayute Phupittayathanakorn, Porawat Visutsak)....Pages 271-283
A Computer Vision Framework for Partitioning of Image-Object Through Graph Theoretical Heuristic Approach (Sourav Saha, Ankita Mandal, Paras Sheth, Harshita Narnoli, Priya Ranjan Sinha Mahapatra)....Pages 284-296
Segmentation of Bengali Handwritten Conjunct Characters Through Structural Disintegration (Rahul Pramanik, Soumen Bag)....Pages 297-306
Rank Order Reduction Based Fast Pattern Matching Algorithm (Himanshu Jaiswal, Deep Suman Dev, Dakshina Ranjan Kisku)....Pages 307-322
3D MRI Brain Image Segmentation: A Two-Stage Framework (Sayan Kahali, Sudip Kumar Adhikari, Jamuna Kanta Sing)....Pages 323-335
A Novel Intelligent Modeling of Storage and Bandwidth Constraints in Distributed Storage Allocation (Hindol Bhattacharya, Samiran Chattopadhyay, Matangini Chattopadhyay, Avishek Banerjee)....Pages 336-346
Integrating Multi-view Data: A Hypergraph Based Approach (Saif Ayan Khan, Sumanta Ray)....Pages 347-357
Chemical Graph Mining for Classification of Chemical Reactions (Shreya Ghosh, Ankita Samaddar, Trishita Goswami, Somnath Pal)....Pages 358-370
Moving Object Detection in Video Under Dynamic Background Condition Using Block-Based Statistical Features (Amlan Raychaudhuri, Satyabrata Maity, Amlan Chakrabarti, Debotosh Bhattacharjee)....Pages 371-383
A Fuzzy Based Hybrid Hierarchical Clustering Model for Twitter Sentiment Analysis (Hima Suresh, S. Gladston Raj)....Pages 384-397
Road-User Specific Analysis of Traffic Accident Using Data Mining Techniques (Prayag Tiwari, Sachin Kumar, Denis Kalitin)....Pages 398-410
Detection of Liver Tumor in CT Images Using Watershed and Hidden Markov Random Field Expectation Maximization Algorithm (Amita Das, S. S. Panda, Sukanta Sabut)....Pages 411-419
Front Matter ....Pages 421-421
Modelling Multiobjective Bilevel Programming for Environmental-Economic Power Generation and Dispatch Using Genetic Algorithm (Debjani Chakraborti, Papun Biswas, Bijay Baran Pal)....Pages 423-439
An Opposition Based Differential Evolution to Solve Multiple Sequence Alignment (Sabari Pramanik, S. K. Setua)....Pages 440-450
Swarm Intelligence Algorithms for Medical Image Registration: A Comparative Study (D. R. Sarvamangala, Raghavendra V. Kulkarni)....Pages 451-465
Rough Kernelized Fuzzy C-Means Based Medical Image Segmentation (Amiya Halder, Siddhartha Guha)....Pages 466-474
A Hybrid PSO-Fuzzy Based Algorithm for Clustering Indian Stock Market Data (Somnath Mukhopadhyay, Tamal Datta Chaudhuri, J. K. Mandal)....Pages 475-487
Application of Artificial Immune System Algorithms for Intrusion Detection (Rama Krushna Das, Manisha Panda, Sanghamitra Dash, Rabindra Kishore Mishra)....Pages 488-503
Genetic Algorithm-Based Matrix Factorization for Missing Value Prediction (Sujoy Chatterjee, Anirban Mukhopadhyay)....Pages 504-516
Genetic Algorithm-Based Association Rule Mining Approach Towards Rule Generation of Occupational Accidents (Sobhan Sarkar, Ankit Lohani, Jhareswar Maiti)....Pages 517-530
Intelligent Generation of Flavor Preserving Alternative Recipes for Individuals with Dietary Restrictions (Somosmita Mitra, Pabitra Mitra)....Pages 531-539
Intuitionistic Multi-fuzzy Convolution Operator and Its Application in Decision Making (Amalendu Si, Sujit Das)....Pages 540-551
Bengali-to-English Forward and Backward Machine Transliteration Using Support Vector Machines (Kamal Sarkar, Soma Chatterjee)....Pages 552-566
Type-2 Fuzzy Controller with Type-1 Tuning Scheme for Overhead Crane Control (IndrajΔ±t Naskar, A. K. Pal)....Pages 567-576
A Spatial Domain Image Authentication Technique Using Genetic Algorithm (Amrita Khamrui, Diotima Dutta Gupta, S. Ghosh, S. Nandy)....Pages 577-584
Control of Two-Axis Helicopter Model Using Fuzzy Logic (Abhishek Kar, Nirmal Baran Hui)....Pages 585-598
Memetic Algorithm Based Feature Selection for Handwritten City Name Recognition (Manosij Ghosh, Samir Malakar, Showmik Bhowmik, Ram Sarkar, Mita Nasipuri)....Pages 599-613
Improved A-star Algorithm with Least Turn for Robotic Rescue Operations (Ashok M. Chaudhari, Minal R. Apsangi, Akshay B. Kudale)....Pages 614-627
Back Matter ....Pages 629-631


πŸ“œ SIMILAR VOLUMES


Artificial Intelligence for Intrusion De
✍ Mayank Swarnkar, Shyam Singh Rajput πŸ“‚ Library πŸ“… 2023 πŸ› CRC Press 🌐 English

This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS). Features β€’ A systematic overview of the state-of-the-art IDS β€’ Proper explanation of novel cyber attacks

Artificial Immune Systems and Their Appl
✍ Dipankar Dasgupta (auth.), Dipankar Dasgupta (eds.) πŸ“‚ Library πŸ“… 1999 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Artificial immune systems are highly distributed systems based on the principles of the natural system. This is a new and rapidly growing field offering powerful and robust information processing capabilities for solving complex problems. Like artificial neural networks, artificial immune systems

Artificial Immune System: Applications i
✍ Ying Tan πŸ“‚ Library πŸ“… 2016 πŸ› Wiley-IEEE Computer Society Pr 🌐 English

This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security<br /> <ul> <li>Covers all of the current achievements in computer security based on

FuzzyData Mining and Genetic Algorithms
✍ Bridges S.M., Vaughn R.B. πŸ“‚ Library πŸ“… 2000 🌐 English

We are developing a prototype intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection

An Improved Algorithm for Fuzzy Data Min
✍ Florez G., Bridges S.M., Vaughn R.B. πŸ“‚ Library πŸ“… 2004 🌐 English

We have been using fuzzy data mining techniques to extract patterns that represent normal behavior for intrusion detection. In this paper we describe a variety of modifications that we have made to the data mining algorithms in order to improve accuracy and efficiency. We use sets of fuzzy associati

Extrusion detection: security monitoring
✍ Bejtlich, Richard πŸ“‚ Library πŸ“… 2005;2006 πŸ› Addison-Wesley Professional 🌐 English

<b>Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks</b><br /><br />Today's most devastating security attacks are launched from within the company, by intruders who have compromised your users' Web browsers, e-mail and chat clients, and other Internet-connected software.