Framework of an immunity-based anomaly detection system for user behavior

被引:0
作者
Okamoto, Takeshi [1 ]
Ishida, Yoshiteru [1 ]
机构
[1] Kanagawa Inst Technol, Dept Network Engn, Atsugi 2430292, Japan
来源
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS | 2007年 / 4694卷
关键词
anomaly detection; immunity-based system; hidden Markov model; ROC; computer security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper focuses on anomaly detection in user behavior. We present a review of our immunity-based anomaly detection system, and propose a framework of the immunity-based anomaly detection system with a new mechanism of diversity generation. In the framework, each computer on a LAN generates diverse agents, and the agents generated on each computer are shared with all other computers on the LAN. The sharing of agents contributes to their diversity. In addition, We propose an evaluation framework of immunity-based anomaly detection, which is capable of evaluating the differences in detection accuracy between internal and external malicious users.
引用
收藏
页码:821 / 829
页数:9
相关论文
共 9 条
  • [1] A sense of self for unix processes
    Forrest, S
    Hofmeyr, SA
    Somayaji, A
    Longstaff, TA
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 120 - 128
  • [2] A PROBABILISTIC DISTANCE MEASURE FOR HIDDEN MARKOV-MODELS
    JUANG, BH
    RABINER, LR
    [J]. AT&T TECHNICAL JOURNAL, 1985, 64 (02): : 391 - 408
  • [3] Lane T., 1999, P IJCAI 99 WORKSH LE, P35
  • [4] Okamoto T, 2004, LECT NOTES COMPUT SC, V3214, P534
  • [5] Okamoto T., 2003, Transactions of the Institute of Systems, Control and Information Engineers, V16, P1, DOI 10.5687/iscie.16.61
  • [6] Okamoto T, 2003, LECT NOTES ARTIF INT, V2774, P488
  • [7] Okamoto T, 2006, LECT NOTES ARTIF INT, V4252, P123
  • [8] Schonlau M, 2001, STAT SCI, V16, P58
  • [9] Detecting intrusions using system calls: Alternative data models
    Warrender, C
    Forrest, S
    Pearlmutter, B
    [J]. PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 133 - 145