Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers

被引:14
作者
Dozier, Gerry [1 ]
Brown, Douglas
Hou, Haiyu
Hurley, John
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
artificial immune systems; intrusion detection systems; GENERTIA;
D O I
10.1016/j.asoc.2006.05.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial immune systems ( AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems ( IDSs). In this paper, we compare a genetic hacker with 12 evolutionary hackers based on particle swarm optimization (PSO) that have been effectively used as vulnerability analyzers ( red teams) for AIS-based IDSs. Our results show that the PSO-based red teams that use Clerc's constriction coefficient outperform those that do not. Our results also show that the three types of red teams ( genetic, basic PSO, and PSO with the constriction coefficient) have distinct search behaviors that are complimentary. (c) 2006 Elsevier B. V. All rights reserved.
引用
收藏
页码:547 / 553
页数:7
相关论文
共 29 条
[1]  
[Anonymous], P PART SWARM OPT WOR
[2]  
[Anonymous], 1992, Real-coded genetic algorithms and interval-schemata
[3]  
[Anonymous], 1991, Handbook of genetic algorithms
[4]  
BALTHROP J, 2002, P 2002 C EV COMP CEC
[5]  
Bloedorn E, 2001, DATA MINING NETWORK
[6]  
Cannady J., 1998, P 1998 NAT INF SYST, P443
[7]   An immunity-based technique to characterize intrusions in computer networks [J].
Dasgupta, D ;
González, F .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) :281-291
[8]  
DASGUPTA D, 1999, ARTIFICIAL IMMUNE SY, P3, DOI DOI 10.1007/978-3-642-59901-91
[9]  
Dozier G., 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753), P111, DOI 10.1109/CEC.2004.1330845
[10]  
Dozier G, 2003, SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, P171