Host-based intrusion detection systems adapted from agent-based artificial immune systems

被引:40
作者
Ou, Chung-Ming [1 ]
机构
[1] Kainga Univ, Dept Informat Management, Luchu 338, Taiwan
关键词
Intrusion detection; Artificial immune system; Agent; Dendritic cell algorithm; Danger theory; MODEL;
D O I
10.1016/j.neucom.2011.07.031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Agent-based artificial immune system (ABAIS) is adopted to intrusion detection system (IDS). An agent-based IDS (ABIDS) inspired by the danger theory of human immune system is proposed. Multiple agents are embedded to ABIDS, where agents coordinate one another to calculate mature context antigen value (MCAV) and update activation threshold for security responses. The intelligence behind ABIDS is based on the danger theory and the functionalities of dendritic cells in human immune systems, while dendritic cells agents (DC agent) are emulated for innate immune subsystem and artificial T-cell agents (TC agent) are for adaptive immune subsystem. Antigens are profiles of system calls while corresponding behaviors are regarded as signals. This ABIDS is based on the dual detections of DC agents for signals and TC agents for antigens. ABAIS is an intelligent system with learning and memory capabilities. According to MCAVs, immune response to malicious behaviors is activated by either computer host or Security Operating Center. Accordingly, computer hosts met with malicious intrusions can be effectively detected by input signals and temporary output signals such as PAMP, danger and safe signals. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:78 / 86
页数:9
相关论文
共 22 条
  • [1] Aickelin U, 2004, LECT NOTES COMPUT SC, V3239, P316
  • [2] Aickelin U, 2003, LECT NOTES COMPUT SC, V2787, P147
  • [3] An agent based and biological inspired real-time intrusion detection and security model for computer network operations
    Boukerche, Azzedine
    Machado, Renato B.
    Juca, Kathia R. L.
    Sobral, Joao Bosco M.
    Notare, Mirela S. M. A.
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (13) : 2649 - 2660
  • [4] Agent-based artificial immune system approach for adaptive damage detection in monitoring networks
    Chen, Bo
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 35 (06) : 633 - 645
  • [5] FORREST S, P 1996 IEEE S RES SE, P120
  • [6] Fu H., 2007 INT C COMP INT, P570
  • [7] Greensmith J., 2008, ROBUST INTELLIGENT S, P89, DOI [10.1007/978-1-84800-261-6_5, DOI 10.1007/978-1-84800-261-6_5]
  • [8] Information fusion for anomaly detection with the dendritic cell algorithm
    Greensmith, Julie
    Aickelin, Uwe
    Tedesco, Gianni
    [J]. INFORMATION FUSION, 2010, 11 (01) : 21 - 34
  • [9] Greensmith J, 2008, EVOL INTELL, V1, P85, DOI 10.1007/s12065-008-0008-6
  • [10] Gu F., 9 EUR AG SYST SUMM S