Immune Approach in Network Anomaly Detection Problem

In this paper authors propose an approach of applying the algorithm of negative selection to detect anomalies in network traffic data obtained by means of protocol IPFIX. In this paper we try to solve the problem of formalization of the algorithm generating the detectors according to the format of t...

Full description

Bibliographic Details
Main Author: M. R. Mukhtarov
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2012-03-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/553
_version_ 1797719118709784576
author M. R. Mukhtarov
author_facet M. R. Mukhtarov
author_sort M. R. Mukhtarov
collection DOAJ
description In this paper authors propose an approach of applying the algorithm of negative selection to detect anomalies in network traffic data obtained by means of protocol IPFIX. In this paper we try to solve the problem of formalization of the algorithm generating the detectors according to the format of the IPFIX protocol.
first_indexed 2024-03-12T09:00:08Z
format Article
id doaj.art-d5ab676bfdf947b1a8975ae0613a579c
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T09:00:08Z
publishDate 2012-03-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-d5ab676bfdf947b1a8975ae0613a579c2023-09-02T15:44:52ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362012-03-01191105106543Immune Approach in Network Anomaly Detection ProblemM. R. MukhtarovIn this paper authors propose an approach of applying the algorithm of negative selection to detect anomalies in network traffic data obtained by means of protocol IPFIX. In this paper we try to solve the problem of formalization of the algorithm generating the detectors according to the format of the IPFIX protocol.https://bit.mephi.ru/index.php/bit/article/view/553artificial immune systemIPFIXnetwork anomaliesnetwork security
spellingShingle M. R. Mukhtarov
Immune Approach in Network Anomaly Detection Problem
Безопасность информационных технологий
artificial immune system
IPFIX
network anomalies
network security
title Immune Approach in Network Anomaly Detection Problem
title_full Immune Approach in Network Anomaly Detection Problem
title_fullStr Immune Approach in Network Anomaly Detection Problem
title_full_unstemmed Immune Approach in Network Anomaly Detection Problem
title_short Immune Approach in Network Anomaly Detection Problem
title_sort immune approach in network anomaly detection problem
topic artificial immune system
IPFIX
network anomalies
network security
url https://bit.mephi.ru/index.php/bit/article/view/553
work_keys_str_mv AT mrmukhtarov immuneapproachinnetworkanomalydetectionproblem