Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers

被引:0
作者
Dozier, G [1 ]
Brown, D
Hurley, J
Cain, K
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
来源
GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2004, PT 1, PROCEEDINGS | 2004年 / 3102卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the design of AIS-based IDSs can be improved through the use of evolutionary hackers in the form of GENERTIA red teams (GRTs) to discover holes (in the form of type II errors) found in the immune system. GENERTIA is an interactive tool for the design and analysis of immunity-based intrusion detection systems. Although the research presented in this paper focuses on AIS-based IDSs, the concept of GENERTIA and red teams can be applied to any IDS that uses machine learning techniques to develop models of normal and abnormal network traffic. In this paper we compare a genetic hacker with six evolutionary hackers based on particle swarm optimization (PSO). Our results show that genetic and swarm search are effective and complementary methods for vulnerability analysis. Our results also suggest that red teams based on genetic/PSO hybrids (which we refer to Genetic Swarms) may hold some promise.
引用
收藏
页码:263 / 274
页数:12
相关论文
共 50 条
  • [21] A Novel Immunity-Based Anomaly Detection Method
    Zeng, Jie
    Zeng, Jinquan
    FBIE: 2008 INTERNATIONAL SEMINAR ON FUTURE BIOMEDICAL INFORMATION ENGINEERING, PROCEEDINGS, 2008, : 195 - +
  • [22] IMMUNITY-BASED DETECTION OF CYBERATTACKS ON MQTT BROKERS
    Okamoto, Takeshi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2024, 20 (02): : 617 - 634
  • [23] Immunity-Based Model for Malicious Code Detection
    Zhang, Yu
    Wu, Lihua
    Xia, Feng
    Liu, Xiaowen
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406
  • [24] Artificial immunity-based spam detection system
    Sirisanyalak, B.
    Sornil, O.
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 3392 - 3398
  • [25] Anomaly intrusion detection systems based on evolutionary computing
    Srinoy, Surat
    Chimphlee, Siriporn
    Chimphlee, Witcha
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 166 - +
  • [26] Immunity-Based Evolutionary Interpretation of Diet-Induced Thermogenesis
    Liao, Wan-Hui
    Henneberg, Maciej
    Langhans, Wolfgang
    CELL METABOLISM, 2016, 23 (06) : 971 - 979
  • [27] A dynamic immunity-based model for computer virus detection
    Zhang, Yu
    Li, Tao
    Qin, Renchao
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 515 - 519
  • [28] Artificial immunity-based feature extraction for spam detection
    Sirisanyalak, Burim
    Sornil, Ohm
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 359 - +
  • [29] An Immunity-Based Anomaly Detection System with Sensor Agents
    Okamoto, Takeshi
    Ishida, Yoshiteru
    SENSORS, 2009, 9 (11) : 9175 - 9195
  • [30] A dynamic immunity-based model for computer virus detection
    Zhang, Yu
    Li, Tao
    Qin, Renchao
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 500 - 504