SlideShare a Scribd company logo
Cairo University 
Faculty of Computers and Information 
Information Technology Department 
MultiAgent artificial immune system for 
network intrusion detection 
Amira Sayed Abdel-Aziz* 
Under Supervision of 
Prof. Sanaa El-Ola Hanafi 
Prof. Aboul ella Hassanien* 
Faculty of Computers and Information, Cairo University 
• Scientific Research Group in Egypt (SRGE) 
http://www.egyptscience.net
Agenda 
 Introduction 
 Problem Definition 
 Motivation 
 Preliminaries 
 Network Intrusion Detection 
 Artificial Immune Systems 
 Negative Selection Algorithm 
 MultiAgent Systems 
 Proposed Approaches 
 Results and Discussion 
 Conclusions and Future Work 
2
Introduction 
3
Introduction 
 Network and information security 
are of high importance. 
 Research is continuous in these fields to keep up 
with the increasing complexity of attacks. 
 Intrusion Detection is a major research area that: 
 Aims to identify suspicious activities in a monitored 
system, 
 from authorized and unauthorized users, 
 by monitoring and analyzing the system activities. 
4
Problem Definition 
 Problems with anomaly intrusion detection 
 Can’t give much details of detected anomalies. 
 High false alarm rate. 
 Centralization problem for network intrusion detection 
systems – having a single point of failure. 
5
Motivation 
 Similarity between anomaly intrusion detection 
system and immunity system. 
 Applying Negative Selection Algorithm, where it is 
better and more efficient to define what is normal 
than to define what is anomalous. 
 Solving problems mentioned in anomaly intrusion 
detection system. 
6
Motivation 
 Combining multiple techniques to build the system, 
as a single technique is not enough for best results. 
 Building a multiagent system as a distributed system 
to replace centralized intrusion detection system. 
7
In this thesis, a multi-agent anomaly 
network intrusion detection system is 
implemented, inspired by biological 
immunity, to detect and classify network 
attacks. 
8
Preliminaries 
9
Preliminaries – Network Intrusion Detection 
 An Intrusion Detection System (IDS) is a system 
built to detect outside and inside intruders to an 
environment by collecting and analyzing its behavior 
data. 
10
Preliminaries – Artificial Immune Systems 
 Artificial Immune Systems (AIS) are set of techniques 
inspired by the Human Immune System. 
11 
AIS 
Immuno-logy 
Computer 
Science 
Engineer 
-ing
Preliminaries – Artificial Immune Systems 
12 
Tolerant 
Human 
Immune 
System 
Robust 
Decentr 
alized 
Adaptiv 
e 
Self-protecti 
ng 
Dynami 
c 
Diverse
Preliminaries – Artificial Immune Systems 
 The HIS has different cells with so many different roles, which 
results in a number of algorithms that give differing levels of 
complexity and can accomplish a range of tasks. 
13
Preliminaries – Artificial Immune Systems 
 AIS Techniques: 
 Clonal Selection Algorithm. 
 Negative Selection Algorithm. 
 Idiotypic Network Approaches. 
 Danger Theory. 
 Dedtrictic Cell Algorithm. 
14
Preliminaries – Negative Selection Algorithm 
 Negative Selection Algorithm (NSA) is an artificial 
immune system technique that is based on the 
self/non-self discrimination. 
15
Preliminaries – MultiAgent Systems 
 A Multi-Agent System (MAS) is a computerized 
system that is composed of intelligent entities called 
agents, that interact with each other and the 
surrounding environment. 
 A MAS is a dynamic system, where the agents may 
unintentionally affect the environment in 
unpredictable ways. 
16
Preliminaries – MultiAgent Systems 
 The agents are actually software agents, usually act 
in collaboration with each other to achieve certain 
goals. 
17 
Cooperation 
Adaptation Autonomy
Proposed MultiAgent Artificial Immune 
System for Network Intrusion 
Detection 
18
Proposed Approaches 
 Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm. 
 Approach 2: Continuous Features Discretization for 
Anomaly Detectors Generation. 
 Approach 3: Feature Selection for Anomaly 
Detectors Generation. 
 Approach 4: Multi-layer Hybrid System for Anomalies 
Detection and Classification. 
 Approach 5: Multiagent AIS for Network Intrusion 
Detection and Classification. 
19
Proposed Approaches 
 Approach 1 
AIS with GADG (Genetic Algorithm 
for Detectors Generation) system 
for anomaly network intrusion 
detection – different distance 
measure used while generating the 
anomaly detectors. 
D. Dasgupta and F. Gonzalez, “An Immunity-based 
Technique to Characterize Intrusions in Computer 
Networks”, IEEE Transactions on Evolutionary 
Computation, Vol. 6(3), pp. 281-291, 2003. 
20 
Start 
Define self space 
S as a collection of 
strings to 
represent normal 
activity 
Generate set of 
detectors R using 
GA 
Use detectors to 
detect anomalous 
connections 
End
Intrusion Detection System inspired by Artificial 
Immune System Using Genetic Algorithm 
 GADG algorithm 
21
Intrusion Detection System inspired by Artificial 
Immune System Using Genetic Algorithm 
 The detectors of the AIS are presented by rules as: 
22 
푅1: 푖푓 … 퐶표푛푑1 … 푡ℎ푒푛 푠푒푙푓 
. 
. 
. 
푅푚: 푖푓 … 퐶표푛푑푚 … 푡ℎ푒푛 푠푒푙푓 
퐶표푛푑푖 
= 푥1 푏푒푡푤푒푒푛 푙표푤푖 
1, ℎ푖푔ℎ푖 
1 , … , 푥푛 푏푒푡푤푒푒푛 푙표푤푖 
푛, ℎ푖푔ℎ푖 
푛 
Where the features in a feature vector are x1 to xn, and the 
detectors (rules) in a detector set are R1to Rm 
.
Intrusion Detection System inspired by Artificial 
Immune System Using Genetic Algorithm 
 A variability value is used to define the high and low 
limits of each feature’s value. 
 Based on the variability size, the self space can be 
narrow or wide. 
23
Intrusion Detection System inspired by Artificial 
Immune System Using Genetic Algorithm 
 To calculate the fitness of an individual (or a rule) in 
the GA, two things are to be taken into account: 
 the number of elements in the training sample that can be 
24 
included in a rule’s hyper-cube 
푛푢푚_푒푙푒푚푒푛푡푠 푅 = 푥푖 ∈ 푆 푎푛푑 푥푖 ∈ 푅 
 And the volume of the hyper-cube that the rule represents 
푣표푙푢푚푒 푅 = 
푛 
(ℎ푖푔ℎ푖 − 푙표푤푖 ) 
(푖=0) 
 Consequently, the fitness is calculated using the following 
equation 
푓푖푡푛푒푠푠 푅 = 푣표푙푢푚푒 푅 − 퐶 x 푛푢푚_푒푙푒푚푒푛푡푠(푅)
Intrusion Detection System inspired by Artificial 
Immune System Using Genetic Algorithm 
 Euclidean and Minkowski distance each was used as a 
distance measure in the GADG, for the sake of 
comparison. 
 Euclidean distance measure: 
25 
푑 푋, 푌 = (푥1 − 푦1)2+(푥2 − 푦2)2 … (푥푛 − 푦푛)2 
 Minkowski distance measure: 
푑 푋, 푌 = ( 
푛 
( 푥푖 − 푦푖 
푖=0 
푝))1 
푝 
where p is the Minkowski metric order, and it can take values 
from 0 to infinity (and can even be a real value between 0 and 
1).
Intrusion Detection System inspired by Artificial 
Immune System Using Genetic Algorithm 
 The algorithm was originally suggested with the 
application on real-valued features in the NSL-KDD 
data set. 
 The real-valued features are not enough to detect all 
types of attacks, so the algorithm should expand to 
include features of different types. 
 Amira Sayed A. Aziz, Mostafa Salama, Aboul ella Hassanien, and Sanaa El-Ola 
Hanafi. "Detectors generation using genetic algorithm for a negative selection inspired 
anomaly network intrusion detection system." In 2012 Federated Conference on 
Computer Science and Information Systems (FedCSIS), pp. 597-602. IEEE, 
September 2012. 
 Amira Sayed A. Aziz, Mostafa A. Salama, Aboul ella Hassanien, and Sanaa El-Ola 
Hanafi. "Artificial Immune System Inspired Intrusion Detection System Using Genetic 
Algorithm." Informatica (03505596) 36, no. 4 (December 2012). (Impact factor =1.12). 
26
Proposed Approaches 
 Approach 2 
Applying continuous features discretization to 
create homogeneity between feature of different 
types. 
Start 
27 
Apply EWB for 
continuous 
features 
discretization 
Define self space 
S as a collection of 
strings to 
represent normal 
activity 
Generate set of 
detectors R using 
GA 
Use detectors to 
detect 
anomalous 
connections 
End
Continuous Features Discretization for 
Anomaly Detectors Generation 
 The problem with using different features is that they 
have different data types: binary, categorical, and 
continuous (real and integer). 
 So, continuous feature discretization should be 
applied to: 
 cover a wide range of values in a way that can represent 
each region uniquely, 
 create some sort of homogeneity between features values 
28 
to apply the GA.
Continuous Features Discretization for 
Anomaly Detectors Generation 
 Equal-width interval binning is the simplest method 
for data discretization. 
 The range of values is divided into k equally sized 
bins, as k is a parameter supplied by the user as the 
required number of bins. 
 The bin width is calculated as 
29 
훿 = 
푥푚푎푥 − 푥푚푖푛 
푘 
 The equal-width interval binning algorithm is a 
global, unsupervised, and static discretization 
algorithm.
Continuous Features Discretization for 
Anomaly Detectors Generation 
 The fitness is measured by calculating the matching 
percentage between an individual and the normal 
samples, as: 
30 
푓푖푡푛푒푠푠 푥 = 
푎 
퐴 
where a is the number of samples matching the individual 
by 100% , and A is the total number of normal samples. 
 Three distance measures were used for comparison 
in the GADG algorithm: Euclidean, Minkowski, and 
Hamming.
Continuous Features Discretization for 
Anomaly Detectors Generation 
 The Hamming distance is calculated as: 
31 
푑 푋, 푌 = 
푛 
푖=0 
(푥푖 − 푦푖 ) 
where n is the number of features.
Continuous Features Discretization for 
Anomaly Detectors Generation 
 The group of features used in the application were 
proposed by a previous algorithm suggested in 
another paper. 
 Still, we need to find the set of features that would 
give the best results in the proposed approach. 
 Hence, a feature selection technique should be 
applied. 
 Amira Sayed A. Aziz, Ahmad Taher Azar, Aboul Ella Hassanien, and Sanaa El- 
Ola Hanafy. "Continuous Features Discretization for Anomaly Intrusion Detectors 
Generation." In Soft Computing in Industrial Applications (Proceedings of the 
17th Online World Conference on Soft Computing in Industrial Applications, 
December 2012), pp. 209-221. Springer International Publishing, 2014. 
32
Proposed Approaches 
 Approach 3 
Comparative analysis between different feature 
selection techniques: CFS, SFFS, SFBS, and PCA. 
Start 
33 
Apply EWB for 
continuous 
features 
discretization 
Apply feature 
selection 
technique to select 
best feature set Define self space 
S as a collection of 
strings to 
represent normal 
Generate set of activity 
detectors R using 
GA 
Use detectors to 
detect 
anomalous 
connections 
End
Feature Selection for Anomaly Detectors 
Generation 
 An accurate mapping of lower-dimensional space of 
features is needed so no information is lost by 
discarding important and basic features. 
 A feature is good when it is relevant but not 
redundant to the other relevant features. 
 The Feature Selection is an essential machine 
learning technique that is important and efficient in 
building classification systems. 
 When used to reduce features, it results in lower 
computation costs and better classification 
performance. 
34
Feature Selection for Anomaly Detectors 
Generation 
 Correlation Feature Selection (CFS) is a heuristic 
approach that evaluates the worthiness of a features 
subset where a feature is considered good if it is 
highly correlated to the class but not to the other 
features. 
 Sequential-Floating Forward Selection (SFFS) 
basically starts with an empty set, then at each 
iteration it adds sequentially the next best feature. In 
addition to that, after each forward step, SFFS 
performs a backward step that discards the worst 
feature of the subset after a new feature is added. 
The backward steps are performed as long as the 
35 
objective function is increasing.
Feature Selection for Anomaly Detectors 
Generation 
 Sequential-Floating Backward Selection (SFBS) 
starts with the full set of features, then it sequentially 
removes the feature that least reduces the objective 
function value. Then, SFBS performs forward steps 
after each backward step, as long as the objective 
function increases. 
 Principal Components Analysis (PCA) is a way to 
find and highlight similarities and differences 
between data by identifying the existing patterns. 
36
Feature Selection for Anomaly Detectors 
Generation 
 The proposed AIS for anomaly intrusion detection 
gives very good detection results so far, but the 
problem with anomaly intrusion detection is that data 
records are labeled as either normal or anomaly. 
 Hence, a classifier is needed to label the detected 
anomalies with their right attack class. 
 Amira Sayed A. Aziz, Ahmad Taher Azar, Mostafa A. Salama, Aboul Ella Hassanien, 
and Sanaa El-Ola Hanafy. "Genetic algorithm with different feature selection 
techniques for anomaly detectors generation." In Computer Science and Information 
Systems (FedCSIS), 2013 Federated Conference on, pp. 769-774. IEEE, September 
2013. 
37
Proposed Approaches 
 Approach 4 
Multi-layer AIS for network intrusion detection and 
classification. 
Start 
38 
Apply EWB for 
continuous 
features 
discretization 
Apply feature 
selection 
technique to select 
best feature set 
Define self space 
S as a collection of 
strings to 
represent normal 
activity 
Generate set of 
detectors R using 
GA 
Use detectors to 
detect anomalous 
connections 
End 
Pass the detected 
anomalies to a 
classifier to label 
them with their 
proper attack class
Multi-layer Hybrid System for Anomalies 
Detection and Classification 
 In anomaly NIDS, traffic is usually classified into 
either normal or anomaly. 
 Hence, a multi-category classifier to label the 
detected anomalies with their right attack classes is 
needed. 
 Many classifiers were applied for a comparative 
analysis, to find which classifier would best classify 
the detected anomalies: Naïve Bayes, Multi-layer 
Perceptron Neural Network, and Decision Trees. 
39
Multi-layer Hybrid System for Anomalies 
Detection and Classification 
 A Naïve Bayesian classifier is a simple probabilistic 
classifier based on applying Bayes theorem with 
strong naive independence assumptions. 
 An Multi-Layer Perceptron (MLP) is an Artificial 
Neural Network, where it is a finite acyclic graph 
where neurons of the i-th layer serve as input 
features for neurons of i+1-th layer. 
40
Multi-layer Hybrid System for Anomalies 
Detection and Classification 
 A Decision Tree (DT) is a structure of layered nodes 
(a hierarchical organization of rules), where a non-terminal 
41 
node represents a decision on a particular 
data item and a leaf (terminal) node represents a 
class. 
 Four types of decision trees were tested: J48 (C4.5) 
decision tree, Naïve Bayes Tree (NBTree), Best-First 
Tree (BFTree), and Random Forrest (RFTree).
Multi-layer Hybrid System for Anomalies 
Detection and Classification 
 The network intrusion detection system is a centralized 
system, where it face many problems of processing 
overload and single point of failure. 
 The AIS is a system of distributed nature, so the intrusion 
detection system is better implemented as a multi-agent 
system. 
 Amira Sayed A. Aziz, Aboul Ella Hassanien, Ahmad Taher Azar, and Sanaa El-Ola 
Hanafi. "Machine Learning Techniques for Anomalies Detection and Classification." 
The International Conference on Advances in Security of Information and 
Communication Networks SecNet 2013, pp. 219-229. Springer Berlin Heidelberg, 
September 2013. 
 Amira Sayed A. Aziz, Aboul ella Hassanien, Sanaa El-Ola Hanafy, M.F. Tolba, "Multi-layer 
42 
hybrid machine learning techniques for anomalies detection and classification 
approach", 2013 13th International Conference on Hybrid Intelligent Systems (HIS), 
pp. 216-221, IEEE, December 2013.
Proposed Approaches 
 Approach 5 Multiagent AIS for network intrusion 
detection and classification. 
43 
Main Agent 
Apply EWB for 
continuous 
features 
discretization 
Apply feature 
selection 
technique to 
select best feature 
set 
Define self space S 
as a collection of 
strings to represent 
normal activity 
Generate set of 
detectors R using 
GA 
Detector Agent 
Use detectors to 
detect anomalous 
connections 
Pass the detected 
anomalies to a 
classifier to label 
them with their proper 
attack class
The Final Proposed System Model 
 The proposed model is a multi-agent system, that 
applies an AIS technique for anomaly network 
intrusion detection and classification. 
44
Main Agent 
 The task of the main agent is to make preparations 
for the detector agents to carry on the detection and 
classification processes, using the train data. 
45
Detector Agent 
46
Detector Agent 
 The system can be very robust against the failure of 
one or two agents. 
 A MAS is also scalable as it is easier to add agents 
to add new capabilities to the system, which would 
be more complex in a monolithic system. 
 Amira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul ella Hassanien, "Multi-Agent Artificial 
Immune System for Network Intrusion Detection and Classification", SOCO14, 9th 
International Conference on Soft Computing Models in Industrial and Environmental 
Applications - Bilbao, Spain, 25 - 27 June 2014. 
47
Results and Discussion 
48
Data Set 
 The approaches were run against the NSL-KDD IDS 
evaluation data set. 
 There are four general types of attacks in the data 
set: Denial of Service (DoS), Probe, User to Root 
(U2R), and Remote to Local (R2L). 
49
Data Set 
 Denial-of-Service Attack (DoS) flooding the network 
with useless traffic. 
 Probe Attack a program used for monitoring or 
collecting data about network activity. 
 User-to-Root (U2R) user attempts to gain root-level 
privileges. 
 Remote-to-Local (R2L) user attempts to gain local 
accessibility through remote connection 
50
Data Set 
 The distributions of normal and attacks records in 
the NSL-KDD data set. 
51 
Total 
Records 
Normal DoS Probe U2R R2L 
Train_20 
% 
25192 
13449 9234 2289 11 209 
53.39% 36.65% 9.09% 0.04% 0.83% 
Train_All 125973 
67343 46927 11656 52 995 
53.46% 36.456% 9.25% 0.04% 0.79% 
Test+ 22544 
9711 7458 2421 200 2754 
43.08% 33.08% 10.74% 0.89% 12.22%
Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm 
 Settings 
52
Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm 
* M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani, “A Detailed Analysis of the KDD Cup 99 
data set”, In Proceedings of the Second IEEE Symposium on Computational Intelligence 
for Security and Defence Applications, 2009. 
53
Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm 
54 
Average Detection Rates (Minkowski) vs. variation values
Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm 
55 
Average Detection Rates (Minkowski) vs. threshold values
Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm 
56 
True Positives Rates (Minkowski)
Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm 
57 
True Negatives Rates (Minkowski)
Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm 
58 
Average True Positives Rates (Minkowski) vs. variation 
values
Approach 1: Intrusion Detection System inspired by 
Artificial Immune System Using Genetic Algorithm 
59 
Average True Negatives Rates (Minkowski) vs. variation 
values
Approach 2: Continuous Features Discretization for 
Anomaly Detectors Generation 
60 * S.T. Powers and J. He, “A hybrid artificial immune system and Self-Organising Map for Network 
Intrusion Detection”, Information Science,Vol. 178(15), pp. 3024-3042, 2008.
Approach 2: Continuous Features Discretization for 
Anomaly Detectors Generation 
 Settings 
61
Approach 2: Continuous Features Discretization for 
Anomaly Detectors Generation 
62 
Average Detection Rates
Approach 2: Continuous Features Discretization for 
Anomaly Detectors Generation 
63 
Average True Positives Rates
Approach 2: Continuous Features Discretization for 
Anomaly Detectors Generation 
64 
Average True Negatives Rates
Approach 3: Feature Selection for Anomaly Detectors 
Generation 
 Settings 
65
Approach 3: Feature Selection for Anomaly Detectors 
Generation 
 Selected Features 
66
Approach 3: Feature Selection for Anomaly Detectors 
Generation 
67 
Average Detection Rates (Accuracy)
Approach 3: Feature Selection for Anomaly Detectors 
Generation 
68 
Average True Positives Rates (Sensitivity)
Approach 3: Feature Selection for Anomaly Detectors 
Generation 
69 
Average True Negatives Rates (Specificity)
Approach 4: Multi-layer Hybrid System for Anomalies 
Detection and Classification 
70 
True Positives Rates (Euclidean)
Approach 4: Multi-layer Hybrid System for Anomalies 
Detection and Classification 
71 
True Positives Rates (Minkowski)
Approach 4: Multi-layer Hybrid System for Anomalies 
Detection and Classification 
72 
DoS Attack Classification Results
Approach 4: Multi-layer Hybrid System for Anomalies 
Detection and Classification 
73 
Probe Attack Classification Results
Approach 4: Multi-layer Hybrid System for Anomalies 
Detection and Classification 
74 
R2L Attack Classification Results
Approach 4: Multi-layer Hybrid System for Anomalies 
Detection and Classification 
75 
U2R Attack Classification Results
Approach 5: Multi-agent Artificial Immune System for 
Network Intrusion Detection 
 Settings: 
 For the GADG process, the population size was 600, 
number of generations is 1000, and the threshold value is 
0.8. 
 These values gave the best results with the features 
selected by SFFS in proposed approach 3. 
 In the experiment, 26 features were selected by SFFS. 
 For the classifiers, the Train_20percent data was used for 
the training, as the classifiers proved to give very good 
results without having to use the whole train data 
records. 
76
Approach 5: Multi-agent Artificial Immune System for 
Network Intrusion Detection 
 For the anomaly detection process, the detection 
rate is calculated as successfully detected true 
positives (anomalies) and true negatives (normal). 
 89.78% of the attacks were successfully detected as 
anomalies. 
Total 
Normal 
(TN) 
77 
Total 
Anomalies 
(TP) 
DoS Probe U2R R2L 
7996 11521 6939 2303 159 2120 
82.34% 89.78% 93.04% 95.13% 79.50% 76.98%
Approach 5: Multi-agent Artificial Immune System for 
Network Intrusion Detection 
 The anomaly data is then classified by going through 
NB classifier first to label the r2l and u2r attacks, 
then the remaining (other) anomalies go through the 
BFTree classifier to label the dos and probe attacks, 
and label the false alarms as normal. 
Normal Anomalies DoS Probe U2R R2L 
78 
1505 
8046/1152 
1 
5440/6939 1826/2303 2/159 778/2120 
87.76% 72.16% 78.40% 79.29% 1.26% 36.70%
Approach 5: Multi-agent Artificial Immune System for 
Network Intrusion Detection 
 Combining the previous results, the final results of 
successfully detected and labeled data records are 
shown in the table below. 
Normal Anomalies DoS Probe U2R R2L 
9501/9711 
79 
8046/1283 
3 
5440/7458 1826/2421 2/200 778/2754 
97.84% 62.7% 72.94% 75.42% 1.00% 28.25%
Approach 5: Multi-agent Artificial Immune System for 
Network Intrusion Detection 
 Obviously U2R and R2L attacks were not recognized 
well by the classifiers as the other attacks. 
 This is due to their very low representation in the 
training data. 
80
Approach 5: Multi-agent Artificial Immune System for 
Network Intrusion Detection 
 The false classification results of the detected 
anomalies are: 
81
Conclusions and Future Work 
82
Conclusion 
 A multi-layer hybrid machine learning intrusion 
detection system was designed and developed to 
achieve high efficiency and improve the detection 
and classification rate accuracy inspired by immune 
systems with negative selection approach. 
 The final application was able to detect 90% of the 
attacks as anomalies, with the false positives (false 
alarms) rate reduced from 17% to only 2%. 
83
Conclusion 
 Different distance measurement functions were 
applied for the generation of detectors in the genetic 
algorithm, including the Minkowski distance function 
and the Euclidean distance function. 
 With all values used within the GA, the Minkowski 
distance function gave better detection rates. 
84
Conclusion 
 It was shown that the decision trees give the best 
results in general. The Naïve Bayes classifier give 
the best results with the attacks that are least 
presented in the data set or have very few training 
records. 
 A multi-agent multi-layer artificial immune system for 
network intrusion detection was implemented and 
tested. 
85
Conclusion 
 The system has the privilege of being light-weight, 
as well as being a distributed system where each 
detector agent detects and classifies anomalies 
directed to the containing host only. 
86
Future Work 
 For future research, we can extend the functionality 
of the multi-agent system, and involve more features 
to be able to detect behavioral attacks on the host, 
such as R2L attacks. 
 Trust dialogues should be adapted in the system for 
the communication between the agents. 
87
Thank You 
Questions? 
88
Ad

Recommended

Negative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly Detection
Xavier Llorà
 
Artificial immune system
Artificial immune system
Tejaswini Jitta
 
AIS
AIS
Sweta Leena Panda
 
2001: An Introduction to Artificial Immune Systems
2001: An Introduction to Artificial Immune Systems
Leandro de Castro
 
Applications of artificial immune system a review
Applications of artificial immune system a review
ijfcstjournal
 
2005: An Introduction to Artificial Immune Systems
2005: An Introduction to Artificial Immune Systems
Leandro de Castro
 
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inspiration to Application: A Tutorial on Artificial Immune Systems
Julie Greensmith
 
2005: A Matlab Tour on Artificial Immune Systems
2005: A Matlab Tour on Artificial Immune Systems
Leandro de Castro
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?
Leandro de Castro
 
2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications
Leandro de Castro
 
An immune agents system for
An immune agents system for
csandit
 
Ij2514951500
Ij2514951500
IJERA Editor
 
Synopsis format maleria disease
Synopsis format maleria disease
Jaswant Singh
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
khawla Osama
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systems
ijcisjournal
 
Efficient Security Alert Management System
Efficient Security Alert Management System
CSCJournals
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
ijsrd.com
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
Yolinda Chiramba
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET Journal
 
Intrusion Detection Using Conditional Random Fields
Intrusion Detection Using Conditional Random Fields
IDES Editor
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
Sujeet Suryawanshi
 
B410054
B410054
Sweta Leena Panda
 
My
My
DrAmin Dastanpour
 
A Beginner’S Guide To Simulation In Immunology
A Beginner’S Guide To Simulation In Immunology
gpfigueredo
 
CEHS 2016 Poster
CEHS 2016 Poster
Eric Ma
 
Student intervention detection using deep learning technique
Student intervention detection using deep learning technique
Venkat Projects
 
50120130406047
50120130406047
IAEME Publication
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Nishanth Gandhidoss
 

More Related Content

What's hot (20)

2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?
Leandro de Castro
 
2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications
Leandro de Castro
 
An immune agents system for
An immune agents system for
csandit
 
Ij2514951500
Ij2514951500
IJERA Editor
 
Synopsis format maleria disease
Synopsis format maleria disease
Jaswant Singh
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
khawla Osama
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systems
ijcisjournal
 
Efficient Security Alert Management System
Efficient Security Alert Management System
CSCJournals
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
ijsrd.com
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
Yolinda Chiramba
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET Journal
 
Intrusion Detection Using Conditional Random Fields
Intrusion Detection Using Conditional Random Fields
IDES Editor
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
Sujeet Suryawanshi
 
B410054
B410054
Sweta Leena Panda
 
My
My
DrAmin Dastanpour
 
A Beginner’S Guide To Simulation In Immunology
A Beginner’S Guide To Simulation In Immunology
gpfigueredo
 
CEHS 2016 Poster
CEHS 2016 Poster
Eric Ma
 
Student intervention detection using deep learning technique
Student intervention detection using deep learning technique
Venkat Projects
 
50120130406047
50120130406047
IAEME Publication
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?
Leandro de Castro
 
2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications
Leandro de Castro
 
An immune agents system for
An immune agents system for
csandit
 
Synopsis format maleria disease
Synopsis format maleria disease
Jaswant Singh
 
Developing an Artificial Immune Model for Cash Fraud Detection
Developing an Artificial Immune Model for Cash Fraud Detection
khawla Osama
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systems
ijcisjournal
 
Efficient Security Alert Management System
Efficient Security Alert Management System
CSCJournals
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
ijsrd.com
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
Yolinda Chiramba
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET Journal
 
Intrusion Detection Using Conditional Random Fields
Intrusion Detection Using Conditional Random Fields
IDES Editor
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
researchinventy
 
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
Sujeet Suryawanshi
 
A Beginner’S Guide To Simulation In Immunology
A Beginner’S Guide To Simulation In Immunology
gpfigueredo
 
CEHS 2016 Poster
CEHS 2016 Poster
Eric Ma
 
Student intervention detection using deep learning technique
Student intervention detection using deep learning technique
Venkat Projects
 

Viewers also liked (14)

Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Nishanth Gandhidoss
 
Intrusion Detection In Open Field Using Geophone (Report)
Intrusion Detection In Open Field Using Geophone (Report)
Nuthan Prasad
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
Mohamed Jelidi
 
Need for National Policy on Open and Distance Learning in India
Need for National Policy on Open and Distance Learning in India
Sanjaya Mishra
 
Innovation in Building presentation 12 Sept 2014
Innovation in Building presentation 12 Sept 2014
Simon McGuinness
 
R-CISC Summit 2016 Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat Intelligence
Jason Trost
 
Image segmentation hj_cho
Image segmentation hj_cho
Hyungjoo Cho
 
Deep Learning with TensorFlow: Understanding Tensors, Computations Graphs, Im...
Deep Learning with TensorFlow: Understanding Tensors, Computations Graphs, Im...
Altoros
 
Data mining slides
Data mining slides
smj
 
Data mining
Data mining
Akannsha Totewar
 
Cloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
의료빅데이터 컨테스트 결과 보고서
의료빅데이터 컨테스트 결과 보고서
GY Lee
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
SlideShare
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Nishanth Gandhidoss
 
Intrusion Detection In Open Field Using Geophone (Report)
Intrusion Detection In Open Field Using Geophone (Report)
Nuthan Prasad
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
Mohamed Jelidi
 
Need for National Policy on Open and Distance Learning in India
Need for National Policy on Open and Distance Learning in India
Sanjaya Mishra
 
Innovation in Building presentation 12 Sept 2014
Innovation in Building presentation 12 Sept 2014
Simon McGuinness
 
R-CISC Summit 2016 Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat Intelligence
Jason Trost
 
Image segmentation hj_cho
Image segmentation hj_cho
Hyungjoo Cho
 
Deep Learning with TensorFlow: Understanding Tensors, Computations Graphs, Im...
Deep Learning with TensorFlow: Understanding Tensors, Computations Graphs, Im...
Altoros
 
Data mining slides
Data mining slides
smj
 
Cloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
의료빅데이터 컨테스트 결과 보고서
의료빅데이터 컨테스트 결과 보고서
GY Lee
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
SlideShare
 
Ad

Similar to MultiAgent artificial immune system for network intrusion detection (20)

IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
IJNSA Journal
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET Journal
 
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...
IOSR Journals
 
A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection System
IJARIIE JOURNAL
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
IJARIIE JOURNAL
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
Drjabez
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Radita Apriana
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
IJNSA Journal
 
my IEEE
my IEEE
DrAmin Dastanpour
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
ijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
ijcseit
 
1725 1731
1725 1731
Editor IJARCET
 
1725 1731
1725 1731
Editor IJARCET
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
Alexander Decker
 
rpaper
rpaper
imu409
 
A Review of Machine Learning based Anomaly Detection Techniques
A Review of Machine Learning based Anomaly Detection Techniques
Editor IJCATR
 
145 148
145 148
Editor IJARCET
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
Alexander Decker
 
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
IJNSA Journal
 
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET- Intrusion Detection System using Genetic Algorithm
IRJET Journal
 
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...
IOSR Journals
 
A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection System
IJARIIE JOURNAL
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
IJARIIE JOURNAL
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
Drjabez
 
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
A Novel and Advanced Data Mining Model Based Hybrid Intrusion Detection Frame...
Radita Apriana
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
IJNSA Journal
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
ijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
ijcseit
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
Alexander Decker
 
rpaper
rpaper
imu409
 
A Review of Machine Learning based Anomaly Detection Techniques
A Review of Machine Learning based Anomaly Detection Techniques
Editor IJCATR
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
Alexander Decker
 
Ad

More from Aboul Ella Hassanien (20)

The 9th International Conference on Advanced Machine Learning Technologies an...
The 9th International Conference on Advanced Machine Learning Technologies an...
Aboul Ella Hassanien
 
المسابقة الرمضانية للاستاذ الدكتور ابو العلا عطيفي حسنين .pdf
المسابقة الرمضانية للاستاذ الدكتور ابو العلا عطيفي حسنين .pdf
Aboul Ella Hassanien
 
انجازات المدرسة العلمية البحثية المصرية (SRSEG) لعام 2024.pdf
انجازات المدرسة العلمية البحثية المصرية (SRSEG) لعام 2024.pdf
Aboul Ella Hassanien
 
ويبينار علي مصطفى مشرفة باشا: اينشتين العربو
ويبينار علي مصطفى مشرفة باشا: اينشتين العربو
Aboul Ella Hassanien
 
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
Aboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
Aboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdf
Aboul Ella Hassanien
 
SRGE photo.pdf
SRGE photo.pdf
Aboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
Aboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفال
Aboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
Aboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
Aboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
Aboul Ella Hassanien
 
The 9th International Conference on Advanced Machine Learning Technologies an...
The 9th International Conference on Advanced Machine Learning Technologies an...
Aboul Ella Hassanien
 
المسابقة الرمضانية للاستاذ الدكتور ابو العلا عطيفي حسنين .pdf
المسابقة الرمضانية للاستاذ الدكتور ابو العلا عطيفي حسنين .pdf
Aboul Ella Hassanien
 
انجازات المدرسة العلمية البحثية المصرية (SRSEG) لعام 2024.pdf
انجازات المدرسة العلمية البحثية المصرية (SRSEG) لعام 2024.pdf
Aboul Ella Hassanien
 
ويبينار علي مصطفى مشرفة باشا: اينشتين العربو
ويبينار علي مصطفى مشرفة باشا: اينشتين العربو
Aboul Ella Hassanien
 
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
Aboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
Aboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdf
Aboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
Aboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفال
Aboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
Aboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
Aboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
Aboul Ella Hassanien
 

Recently uploaded (20)

How to Un-Obsolete Your Legacy Keypad Design
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
resming1
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
hosseinihamid192023
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
FSE-Journal-First-Automated code editing with search-generate-modify.pdf
cl144
 
Complete University of Calculus :: 2nd edition
Complete University of Calculus :: 2nd edition
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Abraham Silberschatz-Operating System Concepts (9th,2012.12).pdf
Shabista Imam
 
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Rapid Prototyping for XR: Lecture 4 - High Level Prototyping.
Mark Billinghurst
 
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Kel.3_A_Review_on_Internet_of_Things_for_Defense_v3.pptx
Endang Saefullah
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
Deep Learning for Image Processing on 16 June 2025 MITS.pptx
resming1
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Modern multi-proposer consensus implementations
Modern multi-proposer consensus implementations
François Garillot
 
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
Call For Papers - 17th International Conference on Wireless & Mobile Networks...
hosseinihamid192023
 
Introduction to sensing and Week-1.pptx
Introduction to sensing and Week-1.pptx
KNaveenKumarECE
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 

MultiAgent artificial immune system for network intrusion detection

  • 1. Cairo University Faculty of Computers and Information Information Technology Department MultiAgent artificial immune system for network intrusion detection Amira Sayed Abdel-Aziz* Under Supervision of Prof. Sanaa El-Ola Hanafi Prof. Aboul ella Hassanien* Faculty of Computers and Information, Cairo University • Scientific Research Group in Egypt (SRGE) http://www.egyptscience.net
  • 2. Agenda  Introduction  Problem Definition  Motivation  Preliminaries  Network Intrusion Detection  Artificial Immune Systems  Negative Selection Algorithm  MultiAgent Systems  Proposed Approaches  Results and Discussion  Conclusions and Future Work 2
  • 4. Introduction  Network and information security are of high importance.  Research is continuous in these fields to keep up with the increasing complexity of attacks.  Intrusion Detection is a major research area that:  Aims to identify suspicious activities in a monitored system,  from authorized and unauthorized users,  by monitoring and analyzing the system activities. 4
  • 5. Problem Definition  Problems with anomaly intrusion detection  Can’t give much details of detected anomalies.  High false alarm rate.  Centralization problem for network intrusion detection systems – having a single point of failure. 5
  • 6. Motivation  Similarity between anomaly intrusion detection system and immunity system.  Applying Negative Selection Algorithm, where it is better and more efficient to define what is normal than to define what is anomalous.  Solving problems mentioned in anomaly intrusion detection system. 6
  • 7. Motivation  Combining multiple techniques to build the system, as a single technique is not enough for best results.  Building a multiagent system as a distributed system to replace centralized intrusion detection system. 7
  • 8. In this thesis, a multi-agent anomaly network intrusion detection system is implemented, inspired by biological immunity, to detect and classify network attacks. 8
  • 10. Preliminaries – Network Intrusion Detection  An Intrusion Detection System (IDS) is a system built to detect outside and inside intruders to an environment by collecting and analyzing its behavior data. 10
  • 11. Preliminaries – Artificial Immune Systems  Artificial Immune Systems (AIS) are set of techniques inspired by the Human Immune System. 11 AIS Immuno-logy Computer Science Engineer -ing
  • 12. Preliminaries – Artificial Immune Systems 12 Tolerant Human Immune System Robust Decentr alized Adaptiv e Self-protecti ng Dynami c Diverse
  • 13. Preliminaries – Artificial Immune Systems  The HIS has different cells with so many different roles, which results in a number of algorithms that give differing levels of complexity and can accomplish a range of tasks. 13
  • 14. Preliminaries – Artificial Immune Systems  AIS Techniques:  Clonal Selection Algorithm.  Negative Selection Algorithm.  Idiotypic Network Approaches.  Danger Theory.  Dedtrictic Cell Algorithm. 14
  • 15. Preliminaries – Negative Selection Algorithm  Negative Selection Algorithm (NSA) is an artificial immune system technique that is based on the self/non-self discrimination. 15
  • 16. Preliminaries – MultiAgent Systems  A Multi-Agent System (MAS) is a computerized system that is composed of intelligent entities called agents, that interact with each other and the surrounding environment.  A MAS is a dynamic system, where the agents may unintentionally affect the environment in unpredictable ways. 16
  • 17. Preliminaries – MultiAgent Systems  The agents are actually software agents, usually act in collaboration with each other to achieve certain goals. 17 Cooperation Adaptation Autonomy
  • 18. Proposed MultiAgent Artificial Immune System for Network Intrusion Detection 18
  • 19. Proposed Approaches  Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm.  Approach 2: Continuous Features Discretization for Anomaly Detectors Generation.  Approach 3: Feature Selection for Anomaly Detectors Generation.  Approach 4: Multi-layer Hybrid System for Anomalies Detection and Classification.  Approach 5: Multiagent AIS for Network Intrusion Detection and Classification. 19
  • 20. Proposed Approaches  Approach 1 AIS with GADG (Genetic Algorithm for Detectors Generation) system for anomaly network intrusion detection – different distance measure used while generating the anomaly detectors. D. Dasgupta and F. Gonzalez, “An Immunity-based Technique to Characterize Intrusions in Computer Networks”, IEEE Transactions on Evolutionary Computation, Vol. 6(3), pp. 281-291, 2003. 20 Start Define self space S as a collection of strings to represent normal activity Generate set of detectors R using GA Use detectors to detect anomalous connections End
  • 21. Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm  GADG algorithm 21
  • 22. Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm  The detectors of the AIS are presented by rules as: 22 푅1: 푖푓 … 퐶표푛푑1 … 푡ℎ푒푛 푠푒푙푓 . . . 푅푚: 푖푓 … 퐶표푛푑푚 … 푡ℎ푒푛 푠푒푙푓 퐶표푛푑푖 = 푥1 푏푒푡푤푒푒푛 푙표푤푖 1, ℎ푖푔ℎ푖 1 , … , 푥푛 푏푒푡푤푒푒푛 푙표푤푖 푛, ℎ푖푔ℎ푖 푛 Where the features in a feature vector are x1 to xn, and the detectors (rules) in a detector set are R1to Rm .
  • 23. Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm  A variability value is used to define the high and low limits of each feature’s value.  Based on the variability size, the self space can be narrow or wide. 23
  • 24. Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm  To calculate the fitness of an individual (or a rule) in the GA, two things are to be taken into account:  the number of elements in the training sample that can be 24 included in a rule’s hyper-cube 푛푢푚_푒푙푒푚푒푛푡푠 푅 = 푥푖 ∈ 푆 푎푛푑 푥푖 ∈ 푅  And the volume of the hyper-cube that the rule represents 푣표푙푢푚푒 푅 = 푛 (ℎ푖푔ℎ푖 − 푙표푤푖 ) (푖=0)  Consequently, the fitness is calculated using the following equation 푓푖푡푛푒푠푠 푅 = 푣표푙푢푚푒 푅 − 퐶 x 푛푢푚_푒푙푒푚푒푛푡푠(푅)
  • 25. Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm  Euclidean and Minkowski distance each was used as a distance measure in the GADG, for the sake of comparison.  Euclidean distance measure: 25 푑 푋, 푌 = (푥1 − 푦1)2+(푥2 − 푦2)2 … (푥푛 − 푦푛)2  Minkowski distance measure: 푑 푋, 푌 = ( 푛 ( 푥푖 − 푦푖 푖=0 푝))1 푝 where p is the Minkowski metric order, and it can take values from 0 to infinity (and can even be a real value between 0 and 1).
  • 26. Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm  The algorithm was originally suggested with the application on real-valued features in the NSL-KDD data set.  The real-valued features are not enough to detect all types of attacks, so the algorithm should expand to include features of different types.  Amira Sayed A. Aziz, Mostafa Salama, Aboul ella Hassanien, and Sanaa El-Ola Hanafi. "Detectors generation using genetic algorithm for a negative selection inspired anomaly network intrusion detection system." In 2012 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 597-602. IEEE, September 2012.  Amira Sayed A. Aziz, Mostafa A. Salama, Aboul ella Hassanien, and Sanaa El-Ola Hanafi. "Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm." Informatica (03505596) 36, no. 4 (December 2012). (Impact factor =1.12). 26
  • 27. Proposed Approaches  Approach 2 Applying continuous features discretization to create homogeneity between feature of different types. Start 27 Apply EWB for continuous features discretization Define self space S as a collection of strings to represent normal activity Generate set of detectors R using GA Use detectors to detect anomalous connections End
  • 28. Continuous Features Discretization for Anomaly Detectors Generation  The problem with using different features is that they have different data types: binary, categorical, and continuous (real and integer).  So, continuous feature discretization should be applied to:  cover a wide range of values in a way that can represent each region uniquely,  create some sort of homogeneity between features values 28 to apply the GA.
  • 29. Continuous Features Discretization for Anomaly Detectors Generation  Equal-width interval binning is the simplest method for data discretization.  The range of values is divided into k equally sized bins, as k is a parameter supplied by the user as the required number of bins.  The bin width is calculated as 29 훿 = 푥푚푎푥 − 푥푚푖푛 푘  The equal-width interval binning algorithm is a global, unsupervised, and static discretization algorithm.
  • 30. Continuous Features Discretization for Anomaly Detectors Generation  The fitness is measured by calculating the matching percentage between an individual and the normal samples, as: 30 푓푖푡푛푒푠푠 푥 = 푎 퐴 where a is the number of samples matching the individual by 100% , and A is the total number of normal samples.  Three distance measures were used for comparison in the GADG algorithm: Euclidean, Minkowski, and Hamming.
  • 31. Continuous Features Discretization for Anomaly Detectors Generation  The Hamming distance is calculated as: 31 푑 푋, 푌 = 푛 푖=0 (푥푖 − 푦푖 ) where n is the number of features.
  • 32. Continuous Features Discretization for Anomaly Detectors Generation  The group of features used in the application were proposed by a previous algorithm suggested in another paper.  Still, we need to find the set of features that would give the best results in the proposed approach.  Hence, a feature selection technique should be applied.  Amira Sayed A. Aziz, Ahmad Taher Azar, Aboul Ella Hassanien, and Sanaa El- Ola Hanafy. "Continuous Features Discretization for Anomaly Intrusion Detectors Generation." In Soft Computing in Industrial Applications (Proceedings of the 17th Online World Conference on Soft Computing in Industrial Applications, December 2012), pp. 209-221. Springer International Publishing, 2014. 32
  • 33. Proposed Approaches  Approach 3 Comparative analysis between different feature selection techniques: CFS, SFFS, SFBS, and PCA. Start 33 Apply EWB for continuous features discretization Apply feature selection technique to select best feature set Define self space S as a collection of strings to represent normal Generate set of activity detectors R using GA Use detectors to detect anomalous connections End
  • 34. Feature Selection for Anomaly Detectors Generation  An accurate mapping of lower-dimensional space of features is needed so no information is lost by discarding important and basic features.  A feature is good when it is relevant but not redundant to the other relevant features.  The Feature Selection is an essential machine learning technique that is important and efficient in building classification systems.  When used to reduce features, it results in lower computation costs and better classification performance. 34
  • 35. Feature Selection for Anomaly Detectors Generation  Correlation Feature Selection (CFS) is a heuristic approach that evaluates the worthiness of a features subset where a feature is considered good if it is highly correlated to the class but not to the other features.  Sequential-Floating Forward Selection (SFFS) basically starts with an empty set, then at each iteration it adds sequentially the next best feature. In addition to that, after each forward step, SFFS performs a backward step that discards the worst feature of the subset after a new feature is added. The backward steps are performed as long as the 35 objective function is increasing.
  • 36. Feature Selection for Anomaly Detectors Generation  Sequential-Floating Backward Selection (SFBS) starts with the full set of features, then it sequentially removes the feature that least reduces the objective function value. Then, SFBS performs forward steps after each backward step, as long as the objective function increases.  Principal Components Analysis (PCA) is a way to find and highlight similarities and differences between data by identifying the existing patterns. 36
  • 37. Feature Selection for Anomaly Detectors Generation  The proposed AIS for anomaly intrusion detection gives very good detection results so far, but the problem with anomaly intrusion detection is that data records are labeled as either normal or anomaly.  Hence, a classifier is needed to label the detected anomalies with their right attack class.  Amira Sayed A. Aziz, Ahmad Taher Azar, Mostafa A. Salama, Aboul Ella Hassanien, and Sanaa El-Ola Hanafy. "Genetic algorithm with different feature selection techniques for anomaly detectors generation." In Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on, pp. 769-774. IEEE, September 2013. 37
  • 38. Proposed Approaches  Approach 4 Multi-layer AIS for network intrusion detection and classification. Start 38 Apply EWB for continuous features discretization Apply feature selection technique to select best feature set Define self space S as a collection of strings to represent normal activity Generate set of detectors R using GA Use detectors to detect anomalous connections End Pass the detected anomalies to a classifier to label them with their proper attack class
  • 39. Multi-layer Hybrid System for Anomalies Detection and Classification  In anomaly NIDS, traffic is usually classified into either normal or anomaly.  Hence, a multi-category classifier to label the detected anomalies with their right attack classes is needed.  Many classifiers were applied for a comparative analysis, to find which classifier would best classify the detected anomalies: Naïve Bayes, Multi-layer Perceptron Neural Network, and Decision Trees. 39
  • 40. Multi-layer Hybrid System for Anomalies Detection and Classification  A Naïve Bayesian classifier is a simple probabilistic classifier based on applying Bayes theorem with strong naive independence assumptions.  An Multi-Layer Perceptron (MLP) is an Artificial Neural Network, where it is a finite acyclic graph where neurons of the i-th layer serve as input features for neurons of i+1-th layer. 40
  • 41. Multi-layer Hybrid System for Anomalies Detection and Classification  A Decision Tree (DT) is a structure of layered nodes (a hierarchical organization of rules), where a non-terminal 41 node represents a decision on a particular data item and a leaf (terminal) node represents a class.  Four types of decision trees were tested: J48 (C4.5) decision tree, Naïve Bayes Tree (NBTree), Best-First Tree (BFTree), and Random Forrest (RFTree).
  • 42. Multi-layer Hybrid System for Anomalies Detection and Classification  The network intrusion detection system is a centralized system, where it face many problems of processing overload and single point of failure.  The AIS is a system of distributed nature, so the intrusion detection system is better implemented as a multi-agent system.  Amira Sayed A. Aziz, Aboul Ella Hassanien, Ahmad Taher Azar, and Sanaa El-Ola Hanafi. "Machine Learning Techniques for Anomalies Detection and Classification." The International Conference on Advances in Security of Information and Communication Networks SecNet 2013, pp. 219-229. Springer Berlin Heidelberg, September 2013.  Amira Sayed A. Aziz, Aboul ella Hassanien, Sanaa El-Ola Hanafy, M.F. Tolba, "Multi-layer 42 hybrid machine learning techniques for anomalies detection and classification approach", 2013 13th International Conference on Hybrid Intelligent Systems (HIS), pp. 216-221, IEEE, December 2013.
  • 43. Proposed Approaches  Approach 5 Multiagent AIS for network intrusion detection and classification. 43 Main Agent Apply EWB for continuous features discretization Apply feature selection technique to select best feature set Define self space S as a collection of strings to represent normal activity Generate set of detectors R using GA Detector Agent Use detectors to detect anomalous connections Pass the detected anomalies to a classifier to label them with their proper attack class
  • 44. The Final Proposed System Model  The proposed model is a multi-agent system, that applies an AIS technique for anomaly network intrusion detection and classification. 44
  • 45. Main Agent  The task of the main agent is to make preparations for the detector agents to carry on the detection and classification processes, using the train data. 45
  • 47. Detector Agent  The system can be very robust against the failure of one or two agents.  A MAS is also scalable as it is easier to add agents to add new capabilities to the system, which would be more complex in a monolithic system.  Amira Sayed A. Aziz, Sanaa El-Ola Hanafi, Aboul ella Hassanien, "Multi-Agent Artificial Immune System for Network Intrusion Detection and Classification", SOCO14, 9th International Conference on Soft Computing Models in Industrial and Environmental Applications - Bilbao, Spain, 25 - 27 June 2014. 47
  • 49. Data Set  The approaches were run against the NSL-KDD IDS evaluation data set.  There are four general types of attacks in the data set: Denial of Service (DoS), Probe, User to Root (U2R), and Remote to Local (R2L). 49
  • 50. Data Set  Denial-of-Service Attack (DoS) flooding the network with useless traffic.  Probe Attack a program used for monitoring or collecting data about network activity.  User-to-Root (U2R) user attempts to gain root-level privileges.  Remote-to-Local (R2L) user attempts to gain local accessibility through remote connection 50
  • 51. Data Set  The distributions of normal and attacks records in the NSL-KDD data set. 51 Total Records Normal DoS Probe U2R R2L Train_20 % 25192 13449 9234 2289 11 209 53.39% 36.65% 9.09% 0.04% 0.83% Train_All 125973 67343 46927 11656 52 995 53.46% 36.456% 9.25% 0.04% 0.79% Test+ 22544 9711 7458 2421 200 2754 43.08% 33.08% 10.74% 0.89% 12.22%
  • 52. Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm  Settings 52
  • 53. Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm * M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani, “A Detailed Analysis of the KDD Cup 99 data set”, In Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2009. 53
  • 54. Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm 54 Average Detection Rates (Minkowski) vs. variation values
  • 55. Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm 55 Average Detection Rates (Minkowski) vs. threshold values
  • 56. Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm 56 True Positives Rates (Minkowski)
  • 57. Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm 57 True Negatives Rates (Minkowski)
  • 58. Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm 58 Average True Positives Rates (Minkowski) vs. variation values
  • 59. Approach 1: Intrusion Detection System inspired by Artificial Immune System Using Genetic Algorithm 59 Average True Negatives Rates (Minkowski) vs. variation values
  • 60. Approach 2: Continuous Features Discretization for Anomaly Detectors Generation 60 * S.T. Powers and J. He, “A hybrid artificial immune system and Self-Organising Map for Network Intrusion Detection”, Information Science,Vol. 178(15), pp. 3024-3042, 2008.
  • 61. Approach 2: Continuous Features Discretization for Anomaly Detectors Generation  Settings 61
  • 62. Approach 2: Continuous Features Discretization for Anomaly Detectors Generation 62 Average Detection Rates
  • 63. Approach 2: Continuous Features Discretization for Anomaly Detectors Generation 63 Average True Positives Rates
  • 64. Approach 2: Continuous Features Discretization for Anomaly Detectors Generation 64 Average True Negatives Rates
  • 65. Approach 3: Feature Selection for Anomaly Detectors Generation  Settings 65
  • 66. Approach 3: Feature Selection for Anomaly Detectors Generation  Selected Features 66
  • 67. Approach 3: Feature Selection for Anomaly Detectors Generation 67 Average Detection Rates (Accuracy)
  • 68. Approach 3: Feature Selection for Anomaly Detectors Generation 68 Average True Positives Rates (Sensitivity)
  • 69. Approach 3: Feature Selection for Anomaly Detectors Generation 69 Average True Negatives Rates (Specificity)
  • 70. Approach 4: Multi-layer Hybrid System for Anomalies Detection and Classification 70 True Positives Rates (Euclidean)
  • 71. Approach 4: Multi-layer Hybrid System for Anomalies Detection and Classification 71 True Positives Rates (Minkowski)
  • 72. Approach 4: Multi-layer Hybrid System for Anomalies Detection and Classification 72 DoS Attack Classification Results
  • 73. Approach 4: Multi-layer Hybrid System for Anomalies Detection and Classification 73 Probe Attack Classification Results
  • 74. Approach 4: Multi-layer Hybrid System for Anomalies Detection and Classification 74 R2L Attack Classification Results
  • 75. Approach 4: Multi-layer Hybrid System for Anomalies Detection and Classification 75 U2R Attack Classification Results
  • 76. Approach 5: Multi-agent Artificial Immune System for Network Intrusion Detection  Settings:  For the GADG process, the population size was 600, number of generations is 1000, and the threshold value is 0.8.  These values gave the best results with the features selected by SFFS in proposed approach 3.  In the experiment, 26 features were selected by SFFS.  For the classifiers, the Train_20percent data was used for the training, as the classifiers proved to give very good results without having to use the whole train data records. 76
  • 77. Approach 5: Multi-agent Artificial Immune System for Network Intrusion Detection  For the anomaly detection process, the detection rate is calculated as successfully detected true positives (anomalies) and true negatives (normal).  89.78% of the attacks were successfully detected as anomalies. Total Normal (TN) 77 Total Anomalies (TP) DoS Probe U2R R2L 7996 11521 6939 2303 159 2120 82.34% 89.78% 93.04% 95.13% 79.50% 76.98%
  • 78. Approach 5: Multi-agent Artificial Immune System for Network Intrusion Detection  The anomaly data is then classified by going through NB classifier first to label the r2l and u2r attacks, then the remaining (other) anomalies go through the BFTree classifier to label the dos and probe attacks, and label the false alarms as normal. Normal Anomalies DoS Probe U2R R2L 78 1505 8046/1152 1 5440/6939 1826/2303 2/159 778/2120 87.76% 72.16% 78.40% 79.29% 1.26% 36.70%
  • 79. Approach 5: Multi-agent Artificial Immune System for Network Intrusion Detection  Combining the previous results, the final results of successfully detected and labeled data records are shown in the table below. Normal Anomalies DoS Probe U2R R2L 9501/9711 79 8046/1283 3 5440/7458 1826/2421 2/200 778/2754 97.84% 62.7% 72.94% 75.42% 1.00% 28.25%
  • 80. Approach 5: Multi-agent Artificial Immune System for Network Intrusion Detection  Obviously U2R and R2L attacks were not recognized well by the classifiers as the other attacks.  This is due to their very low representation in the training data. 80
  • 81. Approach 5: Multi-agent Artificial Immune System for Network Intrusion Detection  The false classification results of the detected anomalies are: 81
  • 83. Conclusion  A multi-layer hybrid machine learning intrusion detection system was designed and developed to achieve high efficiency and improve the detection and classification rate accuracy inspired by immune systems with negative selection approach.  The final application was able to detect 90% of the attacks as anomalies, with the false positives (false alarms) rate reduced from 17% to only 2%. 83
  • 84. Conclusion  Different distance measurement functions were applied for the generation of detectors in the genetic algorithm, including the Minkowski distance function and the Euclidean distance function.  With all values used within the GA, the Minkowski distance function gave better detection rates. 84
  • 85. Conclusion  It was shown that the decision trees give the best results in general. The Naïve Bayes classifier give the best results with the attacks that are least presented in the data set or have very few training records.  A multi-agent multi-layer artificial immune system for network intrusion detection was implemented and tested. 85
  • 86. Conclusion  The system has the privilege of being light-weight, as well as being a distributed system where each detector agent detects and classifies anomalies directed to the containing host only. 86
  • 87. Future Work  For future research, we can extend the functionality of the multi-agent system, and involve more features to be able to detect behavioral attacks on the host, such as R2L attacks.  Trust dialogues should be adapted in the system for the communication between the agents. 87