Agent Based Intrusion Detection System: A computational biology approach

被引:0
作者
Janakiraman, S. [1 ]
Vasudevan, V. [2 ]
Radhakrishnan, S. [3 ]
机构
[1] PSR Engn Coll, Dept Comp Sci & Engn, Sivakasi 626140, Tamil Nadu, India
[2] Arulmigu Kalasalingam Coll Engn, Dept Informat Technol, Krishnankoil, Tamil Nadu, India
[3] Arulmigu Kalasalingam Coll Engn, Dept Comp Sci & Engn, Krishnankoil, Tamil Nadu, India
来源
2006 ANNUAL IEEE INDIA CONFERENCE | 2006年
关键词
agents; anomaly intrusion; intrusion detection; misuse intrusion;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is focused on Network and Agent Based Intrusion Detection Systems. This paper includes an overview of several IDS implementations. Many approaches based on Hidden Markov Models and various forms of Finite State Automata have been proposed to solve problem of detecting anomaly intrusion, a security attack in which an intruder assumes the identity of a legitimate user. It is proposed to give a general framework for IDS based on the application of techniques used in bioinformatics and agent technology. Our approach is focused on the application of techniques used in bioinformatics for a pairwise sequence alignment and multiple sequence alignment to compare the monitored session with past user behavior. To achieve low false positive rate in this framework the intrusion can be detected by means of comparing the signature of the current user's session with already existing signatures of the potential intruder. The algorithms of computational biology such as approximation algorithm and Carillo-Lippman heuristic algorithm and sum-of-pairs scoring function are used to measure similarity between a sequence of commands produced by a potential intruder, the user signature and past intruder's signatures. Finally in this research work computational bioinformatics techniques and agent technology are used to offer security in host and network to yield a promising combination of intrusion detection rate and false positive rate.
引用
收藏
页码:83 / +
页数:2
相关论文
共 50 条
[21]   Collaborative intrusion detection based on coordination agent [J].
Zhang, R ;
Qian, DP ;
Chen, H ;
Wu, WG .
PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, :175-179
[22]   Mobile agent-based intrusion detection [J].
Qiao, YQ ;
Ren, XH ;
Wang, XL .
ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 4, 2005, :57-60
[23]   Mobile agent based intrusion detection system adopting Hidden Markov Model [J].
Lee, Do-hyeon ;
Kim, Doo-young ;
Jung, Jae-il .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 :122-130
[24]   A safe mobile agent system for distributed intrusion detection [J].
Zhong, SC ;
Song, QF ;
Cheng, XC ;
Zhang, Y .
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, :2009-2014
[25]   An Intrusion Detection Approach Based on System Call Sequences and Rules Extraction [J].
Ye Qing ;
Wu Xiaoping ;
Yan Bo .
2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, :14-17
[26]   RTIDS: A Robust Transformer-Based Approach for Intrusion Detection System [J].
Wu, Zihan ;
Zhang, Hong ;
Wang, Penghai ;
Sun, Zhibo .
IEEE ACCESS, 2022, 10 :64375-64387
[27]   A logical replication-based intrusion detection approach for CSCW system [J].
Chen, K ;
Cheng, G ;
Hu, TL ;
Dong, JX .
PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, :841-845
[28]   A blackboard-based Learning Intrusion Detection System: A new approach [J].
Dass, M ;
Cannady, J ;
Potter, WD .
DEVELOPMENTS IN APPLIED ARTIFICIAL INTELLIGENCE, 2003, 2718 :385-390
[29]   Towards a Multi-Agent based Network Intrusion Detection System for a Fleet of Drones [J].
Ouiazzane, Said ;
Barramou, Fatimazahra ;
Addou, Malika .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (10) :351-362
[30]   Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System [J].
Patel, A. ;
Qassim, Q. ;
Shukor, Z. ;
Nogueira, J. ;
Junior, J. ;
Wills, C. .
PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, :223-234