• DocumentCode
    678630
  • Title

    A hybrid artificial immune system for IDS based on SVM and belief function

  • Author

    Singh, Sushil ; Singh, Jay Prakash ; Shrivastva, Gaurav

  • Author_Institution
    Dept. of Comput. Sci. & Eng., RKDF Inst. of Sci. & Technol., Bhopal, India
  • fYear
    2013
  • fDate
    4-6 July 2013
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Increased connectivity and the use of the internet have exposed the subversion in front of the organizations, there for there is a need to use of intrusion detection system to protect information system and communication network from malicious attacks and unauthorized access. An intrusion detection system (IDS) is a security system that monitors computer systems and network traffic, analyze that traffic to identify possible security breaches and raise alerts. An IDS triggers thousands of alerts per day which is difficult for human users to analyze them and take appropriate actions. It is important to reduce the false alarm alerts, intelligently integrate and correlate them in order to present a high level view of the detected security issue to the administrator. In this paper an hybrid model has been proposed in which intrusion detection takes place with the help Dendritic Cell Algorithm and Dempester belief theory along with SVM classification algorithms. It made the Intrusion Detection System much more efficient and accurate as compared to the existing System. It also seems to be an improvement in precise value of proper alarm generation to enhance the performance of the system.
  • Keywords
    Internet; artificial immune systems; authorisation; belief networks; inference mechanisms; pattern classification; support vector machines; Dempster belief theory; IDS; Internet; SVM classification algorithms; alarm generation; belief function; communication network; computer system monitoring; dendritic cell algorithm; hybrid artificial immune system; information system; intrusion detection system; malicious attacks; network traffic monitoring; security breaches; security system; unauthorized access; Accuracy; Classification algorithms; Filtering; Immune system; Intrusion detection; Support vector machines; DCA; Dempster-belif theory; IDS; SVM;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
  • Conference_Location
    Tiruchengode
  • Print_ISBN
    978-1-4799-3925-1
  • Type

    conf

  • DOI
    10.1109/ICCCNT.2013.6726835
  • Filename
    6726835