Intrusion Detection via Artificial Immune System: a Performance-based Approach

作者: Andrea Visconti , Nicoló Fusi , Hooman Tahayori

DOI: 10.1007/978-0-387-09655-1_12

关键词: Computer networkNetwork intrusion detectionHost (network)Set (abstract data type)Denial-of-service attackBuffer overflowIntrusion detection systemComputer scienceState (computer science)Artificial immune system

摘要: In this paper, we discuss the design and engineering of a biologically-inspired, host-based intrusion detection system to protect computer networks. To end, have implemented an Artificial Immune System (AIS) that mimics behavior biological adaptive immune system. The proposed AIS, consists number running artificial white blood cells, which search, recognize, store deny anomalous requests on individual hosts. model monitors through analysing set parameters provide general information its state — ill or not. When some are discovered values, then takes proper action. prove effectiveness suggested model, exhaustive test AIS is conducted, using server Apache, Mysql OpenSSH, results reported. Four types attacks were tested: remote buffer overflow, Distributed Denial Service (DDOS), port scanning, dictionary-attack. proved our definition self/non-self components quite effective in protecting systems.

参考文章(17)
Dipankar Dasgupta, Fabio A. Gonzalez, An Imunogenetic Technique To Detect Anomalies In Network Traffic genetic and evolutionary computation conference. pp. 1081- 1088 ,(2002)
Alexander O Tarakanov, Victor A Skormin, Svetlana P Sokolova, None, Immunocomputing: Principles and Applications ,(2003)
Andrea Visconti, Anastasia Pagnoni, An innate immune system for the protection of computer networks Proceedings of the 4th international symposium on Information and communication technologies. pp. 63- 68 ,(2005) , 10.5555/1071752.1071766
J. Balthrop, S. Forrest, M.R. Glickman, Revisiting LISYS: parameters and normal behavior congress on evolutionary computation. ,vol. 2, pp. 1045- 1050 ,(2002) , 10.1109/CEC.2002.1004387
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Steven A. Hofmeyr, Stephanie Forrest, Architecture for an Artificial Immune System Evolutionary Computation. ,vol. 8, pp. 443- 473 ,(2000) , 10.1162/106365600568257
Steven Andrew Hofmeyr, Stephanie Forrest, An immunological model of distributed detection and its application to computer security The University of New Mexico. ,(1999)
Dipankar Dasgupta, Advances in artificial immune systems IEEE Computational Intelligence Magazine. ,vol. 1, pp. 40- 49 ,(2006) , 10.1109/MCI.2006.329705
C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models ieee symposium on security and privacy. pp. 133- 145 ,(1999) , 10.1109/SECPRI.1999.766910
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, J. McLeod, Danger theory: The link between AIS and IDS? international conference on artificial immune systems. ,vol. 2787, pp. 147- 155 ,(2003) , 10.1007/978-3-540-45192-1_15