Multilevel Network Security Monitoring and Evaluation Model



Similar documents
Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science

An Artificial Immune Model for Network Intrusion Detection

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Computational intelligence in intrusion detection systems

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances

Artificial Immune Systems and Applications for Computer Security

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation

Journal of Chemical and Pharmaceutical Research, 2014, 6(3): Research Article. Analysis of results of CET 4 & CET 6 Based on AHP

QoS Provisioning in Mobile Internet Environment

Magnetometer Realignment: Theory and Implementation

Genetic Algorithms commonly used selection, replacement, and variation operators Fernando Lobo University of Algarve

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Cloud Security - Characteristics, Advantages and Disadvantages

The Analytic Hierarchy Process. Danny Hahn

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System

Data Security Strategy Based on Artificial Immune Algorithm for Cloud Computing

Using Virtual SIP Links to Enable QoS for Signalling

Study of data structure and algorithm design teaching reform based on CDIO model

Decision-making with the AHP: Why is the principal eigenvector necessary

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

DATA ANALYSIS II. Matrix Algorithms

ANALYTIC HIERARCHY PROCESS (AHP) TUTORIAL

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Prediction of DDoS Attack Scheme

University of Lille I PC first year list of exercises n 7. Review

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014

A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique

THE ANALYTIC HIERARCHY PROCESS (AHP)

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES

Capacity planning for fossil fuel and renewable energy resources power plants

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course

Research on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example

A survey on Data Mining based Intrusion Detection Systems

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

CHAPTER 1 INTRODUCTION

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

Course 4 Examination Questions And Illustrative Solutions. November 2000

A Theoretical Framework for Incorporating Scenarios into Operational Risk Modeling

A Service Revenue-oriented Task Scheduling Model of Cloud Computing

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Keywords - Algorithm, Artificial immune system, Classification, Non-Spam, Spam

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

Subspace Analysis and Optimization for AAM Based Face Alignment

Using group communication to support mobile augmented reality applications

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

A Risk Management System Framework for New Product Development (NPD)

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Methods for Firewall Policy Detection and Prevention

The allocation algorithm for data centers in cloud computing architecture from security perspective

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

Additional sources Compilation of sources:

Econometrics Simple Linear Regression

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A Catechistic Method for Traffic Pattern Discovery in MANET

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Firewall Policy Anomalies- Detection and Resolution

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Project Management Software Selection Using Analytic Hierarchy Process Method

Optimum Design of Worm Gears with Multiple Computer Aided Techniques

Sensors & Transducers 2015 by IFSA Publishing, S. L.

Comparison of K-means and Backpropagation Data Mining Algorithms

Bandwidth analysis of multimode fiber passive optical networks (PONs)

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Intrusion Detection System using Log Files and Reinforcement Learning

A Review on Intrusion Detection System based on Artificial Immune System

How To Use Neural Networks In Data Mining

A Frequency-Based Approach to Intrusion Detection

The Multi-Agents Immune System for Network Intrusions Detection (MAISID)

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Network Intrusion Simulation Using OPNET

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Binary Ant Colony Evolutionary Algorithm

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap

CHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression

Transcription:

806 JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 Multilevel Network Security Monitoring and Evaluation Model Jin Yang Department of Computer Science/eShan Normal Univ., eshan, China Email:innyang@63.com Tang iu College of Fundamental Education/Sichuan Normal Univ., Chengdu, China Email: 5396088@qq.com ingxi Peng * Department of Computer and Education software/guangzhou Univ., Guangzhou, China Email: igluckoy@63.com XueJun i, Gang uo Department of Computer Science/eShan Normal Univ., eshan, China Email:797858@qq.com Astract Based on the correspondence etween the artificial immune system antiody and pathogen invasion intensity, this paper is to estalish a real-time network risk evaluation model. According to the network intrusion own characteristics and the consequence from service, assets and attack, this paper design to uild a hierarchical, quantitative measurement indicator system, and an unified evaluation information ase and knowledge ase. The paper also comines assets evaluation system and network integration evaluation system, considering from the application layer, the host layer, network layer may e factors that affect the network risks. The experimental results show that the new model improves the aility of intrusion detection and prevention than that of the traditional passive intrusion prevention systems. Index Terms network security; artificial immune; intrusion detection I. INTRODUCTION The traditional network security approaches include virus detection, frangiility evaluation, and firewall etc, e.g., the Intrusion Detection System (IDS) []. They rely upon collecting and analyzing the viruses specimens or intrusion signatures with some traditional techniques []. Moreover, eing lack of self-learning and self-adapting ailities, they can only prevent those known network intrusions, and can do nothing for those variety intrusions. Recent years, the artificial immune system has the * Corresponding author. This work is supported y the National Natural Science Foundation of China under Grant (No.600330) and the Scientific Research Fund of Sichuan Provincial Education Department (No. 0ZB005). features of dynamic, self-adaptation and diversity [3-6] that ust meet the constraints derived from the characteristics of the grid environment, and moile agent has many same appealing properties as that of artificial immune system. Negative Selection Algorithm and the concept of computer immunity proposed y Forrest in 994 [7-8]. In contrast, the AIS theory adaptively generates new immune cells so that it is ale to detect previously unknown and rapidly evolving harmful antigens [9]. However, much theoretical groundwork in immunological computation has een taken up, ut there is a lack of perfectly systems ased AIS of dynamical immunological surveillance for network security. Based on the correspondence etween the artificial immune system antiody in the artificial immune systems and pathogen invasion intensity, this paper is to estalish a network risk evaluation model. According to the network intrusion own characteristics and the consequence from service, assets and attack, we design to uilt a hierarchical, quantitative measurement indicator system, and an unified evaluation information ase and knowledge ase. This model will help the network managers evaluate the possiility and the graveness degree of the network dangerous quickly, ease the pressure of recognition, to get targeted immediate defense strategy of the strength and risk level of the current network attacks. II. THE EVAUATION OF THE NETWORK DANGER The iological immune system can produce antiodies to resist pathogens through B cells distriuting all over the human ody. And T cells can regulate the antiody concentration. Simulating iological immune system, we place a certain amount of immune cells into the network, and perceive the surrounding environment. Simulating creatural immune system, we place a certain amount of 0 ACADEMY PUBISHER doi:0.4304/sw.6.5.806-83

JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 807 immune cells into the network, and perceive the surrounding environment of the detectors. As soon as the immune detectors detect an attack, the detectors egin clone and generate a mass of similar detectors in order to defend from fiercer network attacks and warn the dangerous level of the network [0]. While the network danger ecome aating, the corresponding numers of antiodies will decrease at the same time. The detectors numer and type reflect the attack s intensity and type suffered y the network intrusion. In this model, the detectors can e categorized, according to the evolvement progress of the detectors themselves, into 3 types, viz. immature detectors, mature detectors and memory detectors, and the content will e expatiated in detail in the following. T ( T (0) 0, t 0 (3) T ( T ( + Tnew ( Δ Tmatch _ self ( Δ Tdead ( Δ Tactive ( Δ (4) T. T. +, when T. < λ (5) Tmatch _ self Tmatch _ self ( xmatch _ self T (, (6) when f match ( T ( t ), Self ( t )) T. T. + (7) Tactive Tactive ( Δ Δt, when T. β (8) xactive Tdeath Tdead ( Δ Δt, xdeath when T. < β,andt. count > λ (9) Tactive xactive Δt I maturatiio n (, T. ρ( Δ 0, when I. > α (0) Figure. The Framework of danger-detecting in the NDEMAIS III. THE DYNAMICA IMMUNOOGICA SURVEIANCE MODE BASED ON AIS A. The Definition of Antigen, Antiody, Self and Non-self l Definition: Antigens ( Ag, Ag U, D {0, } ) are fixed-length inary strings extracted from the Internet Protocol (IP) packets transferred in the network. The antigen consists of the source and destination IP addresses, port numer, protocol type, IP flags, IP overall packet length, TCP/UDP/ICMP fields [-], etc. The structure of an antiody is the same as that of an antigen. For virus detection, the nonself set (Nonself) represents IP packets from a computer network attack, while the self set (Self) is normal sanctioned network service transactions and nonmalicious ackground clutter. Set Ag contains two susets, Self Ag and Nonself Ag such that Self Nonself Ag and Self Nonself Φ. () B. The Dynamic Equations of the Mature Detectors T { x x B, y Self ( < x. d, y > Match x. count < β)} () Equation (4) depicts the lifecycle of the mature detector, simulating the process that the mature detectors evolve into the next generation. All mature detectors have a fixed lifecycle (λ). If a mature detector matches enough antigens ( β ) in its lifecycle, it will evolve to a memory detector. However, the detector will e eliminated and replaced y new generated mature detector if they do not match enough antigens in their lifecycle. T new ( is the generation of new mature detector. T dead ( is the set of detector that haven t match enough antigens ( β ) in lifecycle or classified self antigens as nonself at time t. T ( simulates that the mature detector undergo one step of evolution. T dead ( indicates that the mature detector are getting older. T active ( is the set of the least recently used mature detector which degrade into Memory detector and e given a new age T > 0 and count β >. Because the degraded memory detector has etter detection capaility than mature detector, it is etter to form a memory detector. When the same antigens arrive again, they will e detected immediately y the memory detector. In the mature detector lifecycle, the inefficient detectors on classifying antigens are killed through the process of clone selection. Therefore, the method can enhance detection efficiency when the anormal network ehaviors intrude the system again. In the course, λ is the threshold of the affinity for the activated detectors. The affinity function f match ( x, y) may e any kind of Hamming, Manhattan, Euclidean, and r- continuous matching, etc. In this model, we take r- continuous matching algorithm to compute the affinity of 0 ACADEMY PUBISHER

808 JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 mature detectors. The matching functions utilize the following definitions: i,, i r 0 < i < l, fmatch ( x, y) xi yi, xi+ yi+,, x y () 0 otherwise The r-continuous matching is commonly used method for measuring the distance etween it strings with the goal of producing a etter similarity coefficient. C. The Dynamic Equation of Memory Detectors M ( M (0) 0, t 0 () M ( M ( + M new( Δ + M from _ other ( Δ M dead ( Δ, M (, Ag( ), t >, (3) M ( M ( + Mclone( + M new( Δ + M from _ other ( Δ M dead ( Δ, M (, Ag( ) M clone M active Mclone( Δ( t ), xclone xactive M (, Ag( ) (4) (5) Mclone( Mclone(, M. ρ( M. ρ( + Vp Δt, (6) M. M. + M. ρ( M. ρ(, M. M. +, M (, Ag( ) M M Δt new T ( Δt Δ( t ) x x new ) new (7) active, M new. ρ ( ρ0 active (8) M death M dead ( Δ Δt, M ( t ), Self ( t )) xdeath (9) k i M from _ other M from _ other ( Δ ( Δ (0) i x from _ other Equation (3) depicts the dynamic evolution of memory detector. M ( simulates the process that the memory detector evolve into the next generation ones. M new ( is the set of memory detector that are activated y antigens lately. These mature detector matched y an antigen will e activated immediately and turn to a memory detector. M dead ( is the memory detector that e deleted if it matches a known self antigen. M clone ( is the reproduced memory detector when the detector distinguish a antigens. M from _ other ( is the memory detector that transformed from other computers. The k indicates that the ID numer of the computer. Therefore, dynamic model of immune is to generate more antiodies and enhance the aility of self-adaptation for the system. D. The Dynamic Model of Self In a real-network environment some network services and activities are often change, which were permitted in the past ut may e foridden at the next time. I I(0) { x, x,..., xn }, t 0 () ( I ( I( + I ( Δ I _ ( Δ I Δt () I new match self maturation I. I. + (3) ( I(, I( t ), Self ( t )) (4) match _ self Imaturatiio n( I (, I. > α (5) Irandom Iinherit I new ( Δ ( ξ ) Δt + ( ξ ) Δt (6) x x Equation () stimulates the dynamic evolution of selfantigens, where x i R( i, i N) is the initial self element defined. I new is the set of newly defined elements at time t, and I maturation is the set of mutated elements. f match ( y, x) is used to classify antigens as either self or nonself: if x is a self-antigen, return 0; if x is a nonself one, return ; if x is detected as nonself ut was detected as a self-antigen efore, then it may e a nonself antigen (needs to e confirmed), and return. There are two advantages in this model. () Self immune surveillance: The model deletes mutated self-antigens (I maturation ) in time through surveillance. The false-negative error is reduced. () The dynamic growth of Self: The model can extend the depiction scope of self through adding new self-antigens (I new ) into Self. Therefore, the false-positive error is prevented. E. The Antiody Cross In order to keep the variety of individual as well as the optimal solution can e achieved, we divide the antiody gene to n gene its set and utilize multi-point cross process. For example, we select two gene y random such as ' ' ' ' G { g, g, g i, gn}, G { g, g, g i, gn}, Select some points randomly, and then form two-point pair with some proaility (p) to cross operation, to generate cross point set, and then to generate new gap of ' set Gnew { g, g, gi, gn}. Select cross point according to inomial distriution n k n k P{ X k} p ( p), k 0,,, K, n k. 0 < p < (7) 0 ACADEMY PUBISHER

JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 809 E ( X ) np, D( X ) np( p), where X is the numers of cross points. Then the G and G turn into the offspring G new y the cross process. F. Antiody Variation In order to prevent algorithm from converging prematurely, we take variation operation to the Gene set G { g, g, g i, g n} after the cross process. Select variation point randomly and varied with some variation proaility ( p m ) to generate new generation ' Gnew { g, g, gi, gn}. Select variation point according to Poisson distriution k λ λ e P{ X k}, k 0,,, k! (8) E ( X ) D( X ) λ > 0, where X is the numers of variation points. Then the G turn into the offspring G new y the variation process. G. The Process of Immunological Surveillance These response processes can e divided into two stages: primary immune response, secondary immune response. When the same antigen intrude into the ody for the second time, ecause of the organism have some antiody to identify the antigen, the immune system can respond quickly and come into eing a large numer of homothetic antiodies in order to clear the rapid antigen in the ody. The rapid process is known as secondary immune response. Memory detectors M ( express that the system has suffering various attacks at moment t. Memory detectors concentration value of antiody is ρ(. ρ( shows that at current time the system is suffering what kind of attacks and computes the intensity and categories. It is one of the important indicators of reflection the current system network intrusion danger level. There are two maor changes proaility of antiody concentration. () The increase of the antiody concentration: When the memory detector antiody captures a particular antigen, representing have detecting a kind of invasion, we increase the antiody concentration. We use V ρ ( reflects the rate of increase of antiody concentration. Therefore, at moment t the antiody concentration ρ( of M ( is: ρ(ρ(t-)+ V ρ Δt. Affected y the antigen, the more intensive invasion antigens, the faster at the increase rate of antiody concentration. Taking into account the emergence of the invasion was a random act, such as iodynamic ody falling on the ground, such as trees fluttering in the wind, the random movement of the rate could e suect to Gaussian distriution. Antigen numer x and the variety speed excitation function of antiody concentration V ρ (x) accord with the Gaussian distriution with parameters (h, μ), and these nonlinear causal relationship can e expressed as follows: (which, x is the numer of memory detector detecting the invasion in period of time.) [( x h) u] A V ( x) e ρ, u > 0, 0 < x < + (9) π σ In order to avoid detection unlimited cloning, we regulate A is the largest concentration of limiting growth. Since the each invasion of antigen make different impact on the network and host, we define μ parameters to reflect the extent of the damage caused y antigens. The greater of μ value the faster of the antiody concentration increase speed, and also shows the more dangerous of the antigens captured y the antiody. Parameters h shows that the antigen stimulate the antiody to the limit when stimulation course achieve to a certain extent. () The attenuation of the antiody concentration: In organisms these antiodies which stimulated y some certain antigens will gradually disappear after a certain period of time. In our system, if the memory detector in the next step failed to clone once more, we set the antiody concentration turn into its attenuation phase, in accordance with the following. ρ( t ) ρ( t τ ), τ t T (30) After each half life τ, if the detector did not find any antigen, the antiody concentration will reduce y half. When the antiody concentration decay to ε τ, it will stop decaying, showing that the act of invasion has disappeared. In the mature-detector lifecycle, the inefficient detectors on classifying antigens are killed through the process of clone selection. However, the efficient detectors on classifying antigens will evolve to memory detectors. Therefore, similar antigens representing anormal network ehaviors can e detected quickly when they intrude the system again as secondary immune response. Ⅳ. THE EVAUATION OF THE NETWORK DANGER After we descrie the network attacking actions, it is necessary to evaluate the dangerous degree of the network, and udge the severity of the attacking actions. Network dangers are of diversity (ecause of many affecting factors) and of randomicity. Thus, evaluation is a process involving numerous complicated factors. The essence of evaluation is to hierarchically grade each evaluation factor in terms of its weight in order to ultimately reflect the dangerous degree of the entire network. Our model simulates the process that metaolism and competition of the cells organism through the use of continuous renovation and enrichment process. The values of M reflect the intensity of intrusion in current network. Therefore, system evaluates the network security y perceiving the danger around of them. Owing to the fact that our model relates to enormous factors for evaluation, on purpose of reasonaly and entirely 0 ACADEMY PUBISHER

80 JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 measuring the network dangerous status, we classify the involved factors as host dangers, area dangers, detectors dangers, and special dangers. The host dangers mainly arise out of the dangers which are possessed y each host computers; the area dangers are divided y regions; the detector dangers are those factors which determined in terms of antiody consistencies, antiody consistencies change speed, and detector types; and particular dangers refer to the second corresponding time and responding speed etc. Afterwards, we sudivide and arrange all the factors which influence the network dangers, in order to let them locate on different layers, forming a structure model with identify matrix. In the traditional evaluation system, the choice usually was made according to few of main factors, taking into account other factors merely as references, and then simply descried the happening possiility of the dangers y high, medium and low. Hence, many factors which cannot e quantified were always ignored, so that the traditional system can not evaluate the varying situation where there are various factors and conditions involved at the same time, which more often than not give rise to the result that evaluation decisions are void of comprehensiveness and that the outcomes are distorted. In our evaluation model we utilize the AHP (Analytic Hierarchy Process) Principle provided y operational research expert T.. Saaty to evaluate the network dangerous situation. This method can efficiently cope with those complex prolems which are difficult to e solved y quantitative methods. Its characteristics are: firstly, it can reak complex questions down to some gradations, then analyze progressively on the layers much simpler than efore in order to express and handle the decision-makers suective udgments through quantity format. Next, it calculates y mathematics the weight of the sequence of relative significance of the factors on each layer. Via the general permutation among all the layers, compute and rank the relative weight of all the factors. We synthetically consider the qualitative and quantitative factors during the evaluation process, adopt the AHP Principle, so as to provide reasonale methods and instruments for comprehensive evaluation of the network dangerous situation. A. Computation the Hierarchy of the Model Owing to the fact that our model relates to enormous factors for evaluation, on purpose of reasonaly and entirely measuring the network dangerous status, we classify the involved factors as host dangers, area dangers, cells dangers, and special dangers. The host dangers mainly arise out of the dangers which are possessed y each host computers; the area dangers are divided y regions; the cell dangers are those factors which determined in terms of cell consistencies, cell-varying speed, and cell types; and particular dangers refer to the second corresponding time and responding speed etc. Afterwards, we sudivide and arrange all the factors which influence the network dangers, in order to let them locate on different layers, forming a structure model with identify matrix. The following danger evaluation model is divided in to the general oect layer (A), the standard layer (B), and the factor layer (C) (see Fig. ). Furthermore, to get the weight values of these factors, this model adopts the AHP method. The underlying idea is to compare and estimate the eigenvalue λ i of the special equation of the matrix B y way of seeking a solution, then find out the maximum eigenvalue λ max and get its corresponding eigenvector X ( x, x, xn ). Finally, we will get relative weight vector A ( w, w, wn ) after merging all eigenvectors into one. In a word, the entire method can e approximately reduced to four steps, that is, estalish hierarchical structure model; construct evaluation matrices; 3 calculate factors relative weight under a coincident standard; 4 compute the integrated weight of the factors on each layer. Hereinafter, the evaluation process will e introduced in detail. Figure. The hierarchy of network danger evaluation model B. Computing Single Weight ) Construct Identify Matrix: First of all, we must construct identify matrix which is result that we compared the relative importance of one group of elements on next layer with some past layer element constraint. That is, it shows the relative importance of any pair of factors. In detail, denote i the compared result of the i th factor and th one, i all together form the identify matrix B : n n B n n nn Where: ii if i and i / i if i. ) Computing Weights: Next we otain the weight of each factor. According to the identify matrix B, we can get the maximum eigenvalue of the matrix λ max. Here, we can get the maximum λ max according with the following contidion: λ n λ n nn n n λ 0 0 ACADEMY PUBISHER

JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 8 Work out the corresponding eigenvector of maximum eigenvalue of B, X ( x, x3, xn), let x i to e the weight of factor u i, then we can get unitary weights denote W i. n n n A ( W, W, Wn ) ( x / xi, x / xi,, xn / xi,) i i i 3) Test of Consistency: Because of complexity of evaluation and limit of individual knowledge, the individual identify matrix may not e consistent with the actual one, or the disagreement of any two identify matrixes may result in error of suective udgment. However, we must test the consistency of the matrix B as follows: Computing consistency value C I λmax n C I (3) n Computing consistency ratio C R C I C R (3) R I Where R I is mean consistency value that can e found in the reference and forms, we often consider that if C R is smaller than 0., the consistency of matrix is acceptale, otherwise we must modify the identify matrix B. 4) Computing the General Weight Order: The general weight order means that the weight order comparing the elements in the present layer and the highest layer. We have got each order of element in rule layer to the oect layer and the values are W, W,, Wn, respectively, we also know that order that design layer to the rule layer and the values are W, W,, Wn, then the general order is W W V W W M Wn W W W M n W W V W W V M M M M W n Wn Vn, (33) C. Evaluating the danger level The entire network of danger level should fully reflect the value of each of the host facing attacks. As the host of each position is not the same such as running a different system for different users and providing different services, influencing different economic, affecting different social and even political values, they are in possession of different essentiality. et n i ( e the numers of i th computers detect attacking at time t. et β i ( 0 β i ) e the importance coefficient of ith computer in the network and α ( 0 α ) e the danger coefficient of the th kind of attack in the network. Then, we can define the attack intensity r i ( of the th kind of attack and the corresponding network danger r i ( as follows: r ( i + e α n i (34) et Importance ( I W ) i 8 k k k e the importance coefficient of th host in the network. Then, we otain the network entire danger level value: R( (indicator value indicator weigh. Therefore, we can get network danger R( situation and evaluate network security at real time. N n R( tanh( ( ( Hosti ' s danger Importance) CRS_ Weightm )) m i N n 8 tanh( ( ( Hosti ' s danger ( I, k Wk )) CRS_ Weightm )) m i k N n 8 tanh( ( ( ri ( ( I, k Wk )) CRS_ Weightm )) m i k (35) The conclusion can e shown that the higher value R( reaches the more dangerous the network is. Ⅴ.EXPERIMENTA RESUTS AND ANAYSIS A. Experimental Environment and Evaluation Indicators Experiments of attack simulation were also carried out in our aoratory. Analytic Hierarchy Process is applied to our model to evaluate the weights of the indicators in the experiments. Considering the preciseness and efficiency, we use indicators to evaluate the network danger, which include host danger, area danger, cells danger, special danger etc. The weights of the indicators are evaluated and sorted y orders and the mapping of all hierarchies can e seen in Tale. TABE I Weight Orders of All ayers B B B 3 B 4 0.0969 0.0485 0.853 0.093 W C 0.0969 C 0.0485 C 3 0.380 0.337 C 3 0.409 0.335 C3 3 0.0934 0.077 C3 4 0.35 0.00 C 4 0.3333 0.0097 C 4 0.6667 0.095 Evaluate the aove indicators: C.R 0.036 < 0.. It has a satisfactory consistency. Consequently, the weights of the indicators in the NAIMAI can e evaluated as the following: host dangers: 0.0969, area dangers: 0.0485, cells dangers: 0.853, special dangers: 0.093 and others dangers: 0.0969, 0.0485, 0.337, 0.335, 0.077, 0.00, 0.0097, and 0.095. The conclusion can e draw that the higher values R( reaches, the more dangerous the network is. Otherwise, the lower the R( is, the safer the network is. 0 ACADEMY PUBISHER

8 JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 An antigen was defined as a fixed length inary string composed of the source/destination IP address, port numer, protocol type, IP flags, IP overall packet length, TCP/UDP/ICMP fields, and etc. The network was attacked y 0 kinds of attacks, such as Syn Flood, and, Smurf, and Teardrop. A total of 0 computers in a network were under surveillance. The task aimed to detect network attacks. Here are the coefficients for the model. We use r-contiguous its matching rule (r8) for computing the affinity, n40 (the size of initial self se, and ξ 4 (the numer of new generated immature detectors). The activation threshold is β ; tolerance period is λ. B. Results and Analysis Figure 3 illustrates the syn attacks. Figure 4 depicts the evaluation of the network danger in our model. 30000 This paper comines the risk evaluation methods with application security engineering principles, and can change current passive defense situation using traditional network security approaches, and is helpful to estalish new generation proactive defense theories and realization techniques. At the same time, the work is of not only theoretic values to design proactive defense systems which have intrusion tolerant aility and survivaility in any complex network circumstances, ut also very significant to protect network infrastructure. The experimental results show that the proposed model has the features of real-time processing that provide a good solution for network surveillance. ACKNOWEDGMENT This work is supported y the National Natural Science Foundation of China under Grant (No.600330) and the Scientific Research Fund of Sichuan Provincial Education Department (No. 0ZB005). Packets/s 0000 0000 0 Figure 3. Attack intensity 0.8 0.6 0.4 0. 0 Figure 4. 0 0 40 60 80 00 0 Time The network suffering from the syn incursions for instance 0 0 40 60 80 00 0 Time The line of the network dangers otained y our model at these incursions As is shown in Figure 4, R( changes when attack levels changes. The rise in attack levels is accompanied y a corresponding increase in R(, as implies the ad network security. On the other hand, if attack levels decline, R( decreases accordingly after seconds of delay. Therefore, the network can stays on guard even when the attacks occur once again during a very short time. Ⅵ.CONCUSIONS REFERENCES [] Thomas, Ciza, Balakrishnan, N. Performance enhancement of Intrusion Detection Systems using advances in sensor fusion. Information Fusion, 008 th International Conference on June 30, (008):-7 [] Adoul Karim Ganame, Julien Bourgeois, Renaud Bidou, Francois Spies. A gloal security architecture for intrusion detection on computer networks. Computers & Security, 7(), 008:30-47 [3] Vasilios Katos. Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Information Sciences, 77(5), (007), 3060-3073. [4] Agustín Orfila, Javier Caró, Arturo Riagorda. Autonomous decision on intrusion detection with trained BDI agents. Computer Communications, 3(9), (008),803-83. [5] Vincent Touiana, Houda aiod, aurent Reynaud, Yvon Gourhant. A gloal security architecture for operated hyrid WAN mesh networks. Computer Networks, 54(),00: 8-30 [6] Kuy J.: Immunology. Fifith Edition y Richard A. Goldsy et al. [7] F.M.Burnet. The Clone Selection Theory of Acquired Immunity. Gamridge: Gamridge University Press (959) [8] S A Hofmeyr, and S Forrest. Architecture for an artificial immune system. Evolutionary Computation, vol. 8 (000) 443-473 [9] S Forrest, A S Perelson, Allen, and R Cherukuri. Self- Nonself Discrimination in a Computer. Proceedings of IEEE Symposium on Re-search in Security and Privacy, Oakland, (994) [0] Panigrahi BK, Yadav SR, Agrawal S, et al. A clonal algorithm to solve economic load dispatch. Electric Power Systems Research. 77(0), (007):38-389 [] Tao i. An immune ased dynamic intrusion detection model. Chinese Science Bulletin. 50, (005): 650-657 0 ACADEMY PUBISHER

JOURNA OF SOFTWARE, VO. 6, NO. 5, MAY 0 83 [] Tao i. An immunity ased network security risk estimation. Science in China Ser. F Information Sciences. 48 (005):557-578 Tang iu received his M.S. degree in College of Computer Science, Sichuan University, China, in 009. Since 008, he has een a instructor in College of Fundamental Education, Sichuan Normal University. His research interests are in the area of wireless sensor networks. Jin Yang received his M.S. degree and the Ph.D. degree in computer science from Sichuan University, Sichuan, China. He is an Associate Professor in Department of Computer Science at eshan normal university. His main research interests include network security, artificial immune, knowledge discovery and expert systems. ingxi Peng orn in 978. Associate professor, Ph.D. and senior memership of China. His main research interests include network security and artificial immune. 0 ACADEMY PUBISHER