Hybrid multi-agent framework for detection of stealthy probes

被引:6
作者
Mukkamala, Srinivas [1 ]
Sung, Andrew H.
Abraham, Ajith
机构
[1] New Mexico Inst Min & Technol, Inst Complex Addit Syst Anal, Socorro, NM 87801 USA
[2] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM 87801 USA
[3] Oklahoma State Univ, Dept Comp Sci, Stillwater, OK 74078 USA
基金
美国国家科学基金会;
关键词
intrusion detection systems; stealthy probes; controller;
D O I
10.1016/j.asoc.2005.12.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Probing tools are widely used to discover system information. Once the information is known, attackers can launch computer attacks against the vulnerable services running on the system. Even though current computer systems are protected against known attacks by implementing a number of access restriction policies, protection against novel attacks still remains as an elusive goal for the researchers. Attackers defeat current protection and detection mechanisms by exploiting unknown weakness and bugs in system and application software. Stealthy and low profile probes that include only a few carefully crafted packets over an extended period of time are used to delude firewalls and intrusion detection systems ( IDS). Building effective IDSs, unfortunately, has remained an elusive goal owing to the great technical challenges involved and applied AI techniques are increasingly being utilized in attempts to overcome the difficulties. This paper presents computational intelligent agents-based approach to detect computer probes at the originating host. We also investigate and compare the performance of different classifiers used for detecting probes, with respect to the data collected on a real network that includes a variety of simulated probe attacks and the normal activity. Through a variety of experiments and analysis, it is found that with appropriately chosen network features computer probes can be detected in real time or near real time at the originating host. Using the detection information, an effective response mechanism can be implemented at the boundary controllers. (c) 2006 Elsevier B. V. All rights reserved.
引用
收藏
页码:631 / 641
页数:11
相关论文
共 27 条
[1]  
Abraham A, 2001, LECT NOTES COMPUT SC, V2074, P235
[2]  
[Anonymous], 1995, NATURE STAT LEARNING
[3]  
[Anonymous], 1994, CSDTR94013 PURD U
[4]  
Banzhaf W., 1998, Genetic programming: an introduction: on the automatic evolution of computer programs and its applications
[5]  
Basu R, 2001, P IEEE WORKSH INF AS
[6]  
Cannady J., 1998, P 21 NATL INFORM SYS, P368
[7]  
CRAMER M, 1995, P TECHN INF SEC C TI, P1
[8]  
Debar H., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P240, DOI 10.1109/RISP.1992.213257
[9]  
DEBAR H, 1992, P INT JOINT C NEUR N, P78
[10]   MULTIVARIATE ADAPTIVE REGRESSION SPLINES [J].
FRIEDMAN, JH .
ANNALS OF STATISTICS, 1991, 19 (01) :1-67