Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm AA red teams

被引:0
作者
Dozier, G [1 ]
Brown, D [1 ]
Hurley, J [1 ]
Cain, K [1 ]
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
来源
CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2 | 2004年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). In this paper we compare a genetic hacker with 12 evolutionary hackers based on particle swarm optimization (PSO) that have been effectively used as vulnerability analyzers (red teams) for AIS-based IDSs. Our results show that the PSO-based red teams that use Clerc's constriction coefficient outperform those that do not. Our results also show that the three types of red teams (genetic, basic PSO, and PSO with the constriction coefficient) have distinct search behaviors that are complimentary. This result suggests that red teams based on 'Genetic Swarms' may hold the most promise.
引用
收藏
页码:111 / 116
页数:6
相关论文
共 26 条
[1]  
[Anonymous], P PART SWARM OPT WOR
[2]  
[Anonymous], 1992, Real-coded genetic algorithms and interval-schemata
[3]  
[Anonymous], 1991, Handbook of genetic algorithms
[4]  
BALTHROP J, 2002, P 2002 C EV COMP CEC
[5]  
Bloedorn E, 2001, DATA MINING NETWORK
[6]  
Cannady J., 1998, P 1998 NAT INF SYST, P443
[7]   An immunity-based technique to characterize intrusions in computer networks [J].
Dasgupta, D ;
González, F .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (03) :281-291
[8]  
DASGUPTA D, 1999, ARTIFICIAL IMMUNE SY, P3, DOI DOI 10.1007/978-3-642-59901-91
[9]  
Fogel D., 2000, EVOLUTIONARY COMPUTA
[10]  
GOLDBERG DE, 1989, FDN GENETIC ALGORITH, P69