Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers

被引:14
|
作者
Dozier, Gerry [1 ]
Brown, Douglas
Hou, Haiyu
Hurley, John
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
artificial immune systems; intrusion detection systems; GENERTIA;
D O I
10.1016/j.asoc.2006.05.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial immune systems ( AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems ( IDSs). In this paper, we compare a genetic hacker with 12 evolutionary hackers based on particle swarm optimization (PSO) that have been effectively used as vulnerability analyzers ( red teams) for AIS-based IDSs. Our results show that the PSO-based red teams that use Clerc's constriction coefficient outperform those that do not. Our results also show that the three types of red teams ( genetic, basic PSO, and PSO with the constriction coefficient) have distinct search behaviors that are complimentary. (c) 2006 Elsevier B. V. All rights reserved.
引用
收藏
页码:547 / 553
页数:7
相关论文
共 50 条
  • [1] Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers
    Dozier, G
    Brown, D
    Hurley, J
    Cain, K
    GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2004, PT 1, PROCEEDINGS, 2004, 3102 : 263 - 274
  • [2] An immunity-based intrusion detection solution for database systems
    Chen, K
    Chen, G
    Dong, JX
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 773 - 778
  • [3] Immunity-based clonal selection algorithm for intrusion detection systems
    Wu, Zejun
    Qian, Lijin
    Liang, Yiwen
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (06):
  • [4] A model of immunity-based network intrusion detection
    Sun, ZX
    Mao, ZX
    Gong, J
    Xu, HX
    Wang, RC
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 417 - 420
  • [5] An immunity-based model for network intrusion detection
    Zhang, YC
    Que, XR
    Wang, WD
    Cheng, SD
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E24 - E29
  • [6] An immunity-based model for dynamic distributed intrusion detection
    Qiao, Peili
    Wang, Tong
    Su, Jie
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
  • [7] Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems
    Yuji Watanabe
    Yoshiteru Ishida
    Artificial Life and Robotics, 2004, 8 (2) : 163 - 167
  • [8] Immunity-Based Intrusion Detection for Wireless Sensor Networks
    Liu, Yang
    Yu, Fengqi
    2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 439 - 444
  • [9] An immunity-based dynamic multilayer intrusion detection system
    Liang, Gang
    Li, Tao
    Ni, Jiancheng
    Jiang, Yaping
    Yang, Jin
    Gong, Xun
    COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS, PT 3, PROCEEDINGS, 2006, 4115 : 641 - 650
  • [10] An intelligent immunity-based model for distributed intrusion detection
    Peng, Z. (pengzhihao@neusoft.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (08):