Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers

被引:0
作者
Dozier, G [1 ]
Brown, D
Hurley, J
Cain, K
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
来源
GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2004, PT 1, PROCEEDINGS | 2004年 / 3102卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the design of AIS-based IDSs can be improved through the use of evolutionary hackers in the form of GENERTIA red teams (GRTs) to discover holes (in the form of type II errors) found in the immune system. GENERTIA is an interactive tool for the design and analysis of immunity-based intrusion detection systems. Although the research presented in this paper focuses on AIS-based IDSs, the concept of GENERTIA and red teams can be applied to any IDS that uses machine learning techniques to develop models of normal and abnormal network traffic. In this paper we compare a genetic hacker with six evolutionary hackers based on particle swarm optimization (PSO). Our results show that genetic and swarm search are effective and complementary methods for vulnerability analysis. Our results also suggest that red teams based on genetic/PSO hybrids (which we refer to Genetic Swarms) may hold some promise.
引用
收藏
页码:263 / 274
页数:12
相关论文
共 50 条
[41]   Evaluations for immunity-based anomaly detection with dynamic updating of profiles [J].
Okamoto, Takeshi ;
Ishida, Yoshiteru .
ARTIFICIAL LIFE AND ROBOTICS, 2010, 15 (02) :225-228
[42]   Immunity-based evolutionary algorithm for optimal global container repositioning in liner shipping [J].
Wong, Eugene Y. C. ;
Lau, Henry Y. K. ;
Mak, K. L. .
OR SPECTRUM, 2010, 32 (03) :739-763
[43]   A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization [J].
Benmessahel, Ilyas ;
Xie, Kun ;
Chellal, Mouna ;
Semong, Thabo .
EVOLUTIONARY INTELLIGENCE, 2019, 12 (02) :131-146
[44]   A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization [J].
Ilyas Benmessahel ;
Kun Xie ;
Mouna Chellal ;
Thabo Semong .
Evolutionary Intelligence, 2019, 12 :131-146
[45]   Immunity-based evolutionary algorithm for optimal global container repositioning in liner shipping [J].
Eugene Y. C. Wong ;
Henry Y. K. Lau ;
K. L. Mak .
OR Spectrum, 2010, 32 :739-763
[46]   Anomaly detection system for network security: Immunity-based approach [J].
Seredynski, F ;
Bouvry, P ;
Rutkowski, DR .
INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2005, :486-490
[47]   Comparison of immunity-based schemes for aircraft failure detection and identification [J].
Al Azzawi, Dia ;
Moncayo, Hever ;
Perhinschi, Mario G. ;
Perez, Andres ;
Togayev, Adil .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 52 :181-193
[48]   Features Selection Approaches for Intrusion Detection Systems based on Evolutionary Algorithms [J].
Zaman, Safaa ;
El-Abd, Mohammed ;
Karray, Falchri .
2009 3RD INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS (SCS 2009), 2009, :155-160
[49]   Intrusion detection with evolutionary learning classifier systems [J].
Shafi K. ;
Kovacs T. ;
Abbass H.A. ;
Zhu W. .
Natural Computing, 2009, 8 (1) :3-27
[50]   Using vulnerability analysis to model attack scenario for collaborative intrusion detection [J].
Liu, Xuejiao ;
Xiao, Debao .
10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, :1273-1277