The Application Of Immune Clone Algorithm In Network Intrusion Detection
Xuekun Zhang,Jing An,Yongbin Wang,Wen Liu
DOI: https://doi.org/10.1109/icis.2017.7960066
2017-01-01
Abstract:At present, most of the key algorithms of the existing intrusion detection system adopt simple matching technology, only detect the known attack and the false positive and false negative rate is high. The immune cloning algorithm is a search algorithm for iterative process with generating and detecting. In the iterative process, immune cloning algorithm, under the premise of reserving the best individuals of the previous generation, is a global convergence[1]. After further research and improvement based on the operation mechanism and principle of the immune-based intrusion detection system, immune cloning algorithm is applied to the intrusion detection system, which has a very important significance in improving the emergency response capability of the network security system, mitigating the harm of the network attack and enhancing the system's capacity to fight back and so on. This paper, the immune cloning algorithm is used to optimize the detection of the intrusion detection system, use MATLAB software to carry out simulation and obtain the result analysis, and compare with the performance difference of the detector before and after the improvement according to the simulation results.