A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System

A New Negative Selection Algorithm for Adaptive Network Intrusion Detection System

Chikh Ramdane (Sétif 1 University, Sétif, Algeria) and Salim Chikhi (MISC Laboratory, Constantine 2 University, Constantine, Algeria)
Copyright: © 2014 |Pages: 25
DOI: 10.4018/IJISP.2014100101


Negative Selection Algorithm (NSA) is one of the widely used techniques for Intrusion Detection Systems (IDS) designing. In this paper, the proposed is an IDS based on a new model of NSA namely HNSA-IDSA (Hybrid NSA for Intrusion Detection System Adaptation). The proposed system can detect unknown attacks; moreover can be adapted automatically when new profiles' changes of the system are detected. To determine the efficiency of the proposed approach, the standard KDD99 dataset was used for performing experiments. The obtained results show that the authors' mechanism outperforms some literature techniques providing variant important properties as high detection rate, low false positive, adaptability and new attacks detection.
Article Preview


The increasing use of online services for shopping, banking, military transaction and other business, makes information security primordial. Confidentiality, integrity, and availability (CIA), the main properties of data stored in computer systems, ensure that only authenticated and authorized entities are able to reliably access secure information.

However, these principles can be violated when vulnerabilities exists in complex software system. These can be discovered and exploited by malicious users to gain unauthorized access to system. To prevent these security compromises, layers of defense use preventative measures in the network include: pass word, proxies, fire-falls, filters… Hosts are also protected through proactive patching using antivirus, and anti- spy-ware technology, eliminating unnecessary services and implementing used authentication and access control.

Since prevention mechanisms are imperfect, a monitoring for security compromises is required.

This is the role of an IDS. An IDS aims to detect malicious activity in real time and raises an alert.

We distinguish two types of IDS: misuse based systems and anomaly based systems. Misuse based systems uses pattern matching for the analysis. This approach examines network and system activities for known misuses, usually through some form of pattern-matching algorithm. Therefore, the idea behind misuse detection consists of comparing network traffic against a model describing known intrusion events. This approach has proved to be very effective at detecting known threats but largely ineffective at detecting unknown threats (Jungwon, 2007).

On the other hand, anomaly based systems base their decisions on a profile of normal network or system behavior, often constructed using statistical, machine learning or data mining techniques. Any event that does not conform to this profile is considered anomalous (Carlos, 2012). These systems are able to detect new attacks but currently produce a large number of false positives.

Hybrid systems are also considered with the aim to gain the advantages of each approach and to reduce their weakness.

Since its birth, the intrusion detection problem is mostly viewed as anomaly detection or a classification problem in which a given event is assigned as normal or intrusive. So, a variety of statistical, machine learning and data mining techniques have been used in designing and implementing efficient IDS.

The use of artificial immune system (AIS) in intrusion detection is an appealing concept for two reasons. First, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organized and distributed manner. Second, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security.

The negative selection algorithm (NSA) is one of the most important algorithms of AIS. Due to its ability to distinguish the difference between self and non-self, fits naturally into the area of intrusion detection. So a lot of methods and techniques based AIS have been proposed for the effective engineering of IDS.

Detecting unknown attacks and adaptability are the main properties that are very desired for designing an efficient IDS In intrusion detection systems it is very known that the system space (normal/ abnormal) often varies over time, e.g. the computer administrator always changes the configuration of system or network. Moreover, new attacks can occur. The IDS should then adjust the built profile of the normal and abnormal in real time.

In traditional IDS based NSA is difficult if not impossible to update the profile of the system at the time of detection when new changes are made in the listening environment. Furthermore, the current models of proposed NSA for IDS, needs only normal samples from the training class, where in the detection stage of NSA there are only two classes for a tested sample: normal or abnormal, and no detail of abnormal is given. So these methods cannot build an appropriate profile of the system and lacks adaptability.

It motivated by in many intrusion detection applications, abnormal data is often available at the training stage. For instance, in computer security, it is possible, to obtain data about known attacks, e.g. Benchmarks, honey-Pots, honey-Nets, known attacks signature…).

Complete Article List

Search this Journal:
Open Access Articles
Volume 14: 4 Issues (2020): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing