An artificial immune based intrusion detection model for computer and telecommunication systems

被引:24
作者
Boukerche, A
Jucá, KRL
Sobral, JB
Notare, MSMA
机构
[1] Univ Ottawa, Ottawa, ON K1N 6N5, Canada
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
[3] Barddal Univ, Florianopolis, SC, Brazil
关键词
nature inspired solution; human immune systems; intrusion detection;
D O I
10.1016/j.parco.2003.12.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent years have seen a growing interest in computational methods based upon natural phenomena with biologically inspired techniques, such as cellular automata, immune human systems, neural networks, DNA and molecular computing. Some of these techniques are classified under the realm of a general paradigm, called bio-computing. In this paper, we propose a security system for fraud detection of intruders and improper use of both computer system and mobile telecommunication operations. Our technique is based upon data analysis inspired by the natural immune human system. We show how immune metaphors can be used efficiently to tackle this challenging problem. We also describe how our scheme extracts salient features of the immune human system and maps them within a software package designed to identify security violations of a computer system and unusual activities according to the usage log files. Our results indicate that our system shows a significant size reduction of the logs file (i.e., registration of each log activity), and thereby the size of the report maintained by the computer system manager. This might help the system manager to monitor and observe unusual activities on the machine hosts more efficiently, as they happen, and can act accordingly before it is too late. Last but not least, we propose an intrusion and fraud detection model based upon immune human analogy for mobile phone operations. We discuss our model and present its specification using the Z Language. (C) 2004 Published by Elsevier B.V.
引用
收藏
页码:629 / 646
页数:18
相关论文
共 20 条
[1]  
Alberts B., 2002, Molecular Biology of The Cell, V4th
[2]  
BALASUBRAMANIYA.S, 1998, ARCHITECTURE INTRUSI
[3]  
Boukerche A, 2001, W S PA DI C, P255
[4]  
BOUKERCHE A, LNCS, P636
[5]  
CAYZER S, P CEC 2002
[6]   Network security: It's time to take it seriously [J].
Dowd, PW ;
McHenry, JT .
COMPUTER, 1998, 31 (09) :24-+
[7]  
Duda R. O., 2000, PATTERN CLASSIFICATI
[8]   THE IMMUNE-SYSTEM, ADAPTATION, AND MACHINE LEARNING [J].
FARMER, JD ;
PACKARD, NH ;
PERELSON, AS .
PHYSICA D-NONLINEAR PHENOMENA, 1986, 22 (1-3) :187-204
[9]  
FORREST S, 1994, 1994 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY, PROCEEDINGS, P202
[10]  
HOFMEYER S, 1999, THESIS U NEW MEXICO