Immune Approach in Network Anomaly Detection Problem
In this paper authors propose an approach of applying the algorithm of negative selection to detect anomalies in network traffic data obtained by means of protocol IPFIX. In this paper we try to solve the problem of formalization of the algorithm generating the detectors according to the format of t...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2012-03-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/553 |
_version_ | 1797719118709784576 |
---|---|
author | M. R. Mukhtarov |
author_facet | M. R. Mukhtarov |
author_sort | M. R. Mukhtarov |
collection | DOAJ |
description | In this paper authors propose an approach of applying the algorithm of negative selection to detect anomalies in network traffic data obtained by means of protocol IPFIX. In this paper we try to solve the problem of formalization of the algorithm generating the detectors according to the format of the IPFIX protocol. |
first_indexed | 2024-03-12T09:00:08Z |
format | Article |
id | doaj.art-d5ab676bfdf947b1a8975ae0613a579c |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T09:00:08Z |
publishDate | 2012-03-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-d5ab676bfdf947b1a8975ae0613a579c2023-09-02T15:44:52ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362012-03-01191105106543Immune Approach in Network Anomaly Detection ProblemM. R. MukhtarovIn this paper authors propose an approach of applying the algorithm of negative selection to detect anomalies in network traffic data obtained by means of protocol IPFIX. In this paper we try to solve the problem of formalization of the algorithm generating the detectors according to the format of the IPFIX protocol.https://bit.mephi.ru/index.php/bit/article/view/553artificial immune systemIPFIXnetwork anomaliesnetwork security |
spellingShingle | M. R. Mukhtarov Immune Approach in Network Anomaly Detection Problem Безопасность информационных технологий artificial immune system IPFIX network anomalies network security |
title | Immune Approach in Network Anomaly Detection Problem |
title_full | Immune Approach in Network Anomaly Detection Problem |
title_fullStr | Immune Approach in Network Anomaly Detection Problem |
title_full_unstemmed | Immune Approach in Network Anomaly Detection Problem |
title_short | Immune Approach in Network Anomaly Detection Problem |
title_sort | immune approach in network anomaly detection problem |
topic | artificial immune system IPFIX network anomalies network security |
url | https://bit.mephi.ru/index.php/bit/article/view/553 |
work_keys_str_mv | AT mrmukhtarov immuneapproachinnetworkanomalydetectionproblem |