International Journal of Networks and Communications
p-ISSN: 2168-4936 e-ISSN: 2168-4944
2013; 3(3): 81-90
doi:10.5923/j.ijnc.20130303.02
Adetunmbi A. O, Olubadeji Bukky, Alese B. K, Adeola O. S
Department of Computer Science, Federal University of Technology, Akure, Nigeria
Correspondence to: Adeola O. S, Department of Computer Science, Federal University of Technology, Akure, Nigeria.
| Email: | ![]() |
Copyright © 2012 Scientific & Academic Publishing. All Rights Reserved.
The matrix of business and other transaction systems over the Internet makes computer security a critical issue in our day-to-day activities. In recent times, various approaches ranging from rule-based, expert system to data mining have been subjected to extensive research in handling security breaches on computer networks. Immune system (IS) presents a protection against the possibility of malfunctioning and failure of individual host cells. In mammals it keeps the organisms free of pathogens which are unfriendly foreign organisms, cells, or molecules. Two approaches to change detection which are based on the generation of T-cells were examined. One is an existing model while the other model is proposed by us, the one proposed by us is called immunological model, which is a protection model capable of autonomously detecting (Nonself) and opposing the attempts at intrusion and exploitation. The two models were implemented using C++ programming language and their feasibility determined on 1999 International Knowledge Discovery Intrusion Detection Datasets. The results reveal that our proposed model outperforms the existing model not only in terms of detection accuracy but also in terms of simplicity and generation of explainable rules inform of if ... then statements. The classification accuracy of our model christened IMSNT on training and test Datasets are 97.06% and 86.39% as against 89.65% and 85.70% on the Stephanie et al approach, which shows that it is a promising approach. The proposed system apart from its capability of detecting and monitoring the activities on the network can be used in extracting virus signature patterns.
Keywords: Immune System, T-cells, Intrusion Detection, Self-Network and Non-self Network
Cite this paper: Adetunmbi A. O, Olubadeji Bukky, Alese B. K, Adeola O. S, A Discriminatory Model of Self and Nonself Network Traffic, International Journal of Networks and Communications, Vol. 3 No. 3, 2013, pp. 81-90. doi: 10.5923/j.ijnc.20130303.02.
|
U is normal if it is in the memory, and is anomalous otherwise, that is,![]() | (1) |
is a binary classification function and m is a set of patterns drawn from U representing the memory of the detection system, m
U.Basic AssumptionsIn this work some of the assumptions proposed by[8] was adopted and used in building the system. All of the assumptions are justified below:i. U is closed and finite. For any given problem domain, patterns must be represented in some fashion. A fixed size representation is used, and any fixed size representation implies a finite and closed universe.ii.
and
. If there are cases in which this assumption does not hold, which means that there will be patterns that are both self and nonself. It will be impossible for any detection system to correctly classify such ambiguous patterns, and so they will always cause errors.iii. Every location has sufficient memory capacity to encode or represent any pattern drawn from U. Any location that has insufficient memory capacity to encode even a single pattern would be useless, and can be disregarded. If there is a subset of locations for which this assumption holds, then the analysis applies to those locations.
U, with subsets Nl
N and Sl
S, such that Nl
Sl = Ul. The performance of the detection system in terms of classification accuracy are measured during the test phase.In real life situations data sets are made of discrete and continuous variables. In line with this Entropy, a supervised discretization technique is used in discretizing continuous attributes in data set. After, instances of redundant records were removed from the training data set; the classification model was obtained by matching the patterns of both self and nonself in other to obtain the signature patterns of nonself.![]() | (2) |
![]() | (3) |
![]() | (4) |
![]() | (5) |
![]() | Figure 1. Generation of Valid Detector Set (Censoring) (culled from[7]) |
![]() | Figure 2. The monitoring stage |
![]() | Figure 3.1a. The Training Phase for[7] approach |
![]() | Figure 3.1b. The testing algorithm |
|
|
|
wherea. True Positives (TP), the number of self correctly classified as selfa. True Negatives (TN), the number of nonself correctly classified as nonselfb. False Positives (FP), the number of self falsely classified as nonselfc. False Negative (FN), the number of nonself falsely classified as self
|

|

|

![]() | Figure 4. Attribute 4 variation dependency of self and nonself |
![]() | Figure 5. Attribute 5 variation dependency of self and nonself |
![]() | Figure 6. Attribute 6 variation dependency of self and nonself |
|
[7] approach is computational intensive during testing which does not make it appropriate for practical use because it has to compare the newly generated eights strings with the six hundred and one earlier generated Detector-R in its repertoire. The best matching that could be obtained is 1 while in a worst case it has to carry out exhaustive comparison of 4808 matches. The probabilistic approach of this technique was not evaluated as mathematical analysis shows that it is more computationally expensive. The mathematical analysis is computed thus:Assuming, there are 3 strings defined over the five alphabet (A,B,C,D,E) match at three contiguous locations. The number of three contiguous strings that could be obtained in a group of five alphabets = (number of strings in a group) – (number of contiguous strings) + 1 = 5-3+1 = 3Hence number of exhaustive matching for a group = DetectorR * number of contiguos * 3 = 601 * 3 * 3 = 5,409.Hence, for the eights groups that make up a network traffic in this case = 601 * 5409 = 3 250, 809. Our proposed model is less computational intensive, simpler and more effective in terms of computational accuracy.| [1] | G. Meade, Department of Defense Trusted Computer System Evaluation Criteria, National Computer Security Service Centre, 1985. csfc.nist.gov/publications/history/dod85.pdf accessed February 2013 |
| [2] | S. Garfinkel, G. Spafford. Practical UNIX and Internet Security, 2nd Edition. O’Reilly and Associates, Inc. 1996 |
| [3] | C. Janeway, P. Traves, Immunobilogy, The Immune System in Health and Disease, 2nd Edition, Garland Science, New York, 1996 |
| [4] | C. Rui, T. Ying, A Virus Detection System Based on Artificial Immune System, International Conference on Computational Intelligence and Security, China. www.cii.pku.edu.cn/publication, 2009. |
| [5] | N. Liu, D. Wang, X. Huang, S. Liu, K. Zhao, Network Security Situation Awareness\Technology based on Artificial Immunity System. International Forum on Information Technology and Applications, 2009. |
| [6] | C.A. Janeway, P. Travers, M. Walport, M.J. Shilomchik, Immunology: The Immune System in Heath and desease, 5th Edition, New York: Garland, 2001. |
| [7] | F. Stephanie, S.P. Alan, A. Lawrence, C. Rajesh, Self-Nonself Discrimination in a Computer. Proc of IEEE Symposium on Research in Security and Privacy. Oakland: IEEE Press, 1994. pp. 202 - 212. |
| [8] | S.A. Hofmey, An Immunological Model of Distributed Detection and its Application to Computer Security, PhD Dissertation, University of New Mexico, 1999. |
| [9] | S. Forrest, T.A. Longstaff, "A Sense of Self for Unix processes", Proceedings of IEEE Symposium on Computer Security and Privacy, Los Alamos, CA, 1996, pp.120-128. |
| [10] | S. Bellovin, Defending against sequence number attacks internet engineering task force, May RFC 1948. number attacks internet engineering task force, May, RFC 1948, 1996 |
| [11] | L. Wenke, A data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. PhD dissertation, Columbia University, USAhttp://www.cc.gatech.edu/~wenke, 1999. |
| [12] | S. Northcutt, J. Novak, Network Intrusion Detection: An Analyst’s Handbook, Second Edition, New Riders Publishers, USA, 2001. |
| [13] | S. Kumar, Classification and Detection of Computer Intrusions. PhD Dissertation, Department of Computer Science, Purdue University, 1995. |
| [14] | H. Debar, What is behavior based intrusion detection? IBM Zurich Research Laboratory, www.sans.org/privacy.php, 2003 |
| [15] | S. Axelsson, Intrusion Detection Systems: A survey and Taxonomy, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden. Technical Report TR-99-15,2000. |
| [16] | M. V. Mahoney, A machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic, College of Engineering at Florida Institute of Technology, USA, PhD Dissertation, 2003. |
| [17] | KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup |
| [18] | A.O. Adetunmbi, S.O. Adeola, O.A. Daramola Relevance Features Selection for Intrusion Detection, Intelligent, Automation and System Engineering, Lecture Notes in Electrical Engineering, (Boston Springer), vol. 103, 2011, pp. 407 – 418. |
| [19] | A.O. Adetunmbi, S.O. Falaki, O.S. Adewale, B.K. Alese, Intrusion Detection based on rough Set and k-Nearest Neighbour, International Journal of Computing and ICT Research, vol. 2 No. 1, 2008, pp. 60-66. |
| [20] | H. Jiawei, K. Micheline, Data Mining: Concepts and Techniques, Second Edition, Elsevier Inc., 2006. |