Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers

被引:14
|
作者
Dozier, Gerry [1 ]
Brown, Douglas
Hou, Haiyu
Hurley, John
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
artificial immune systems; intrusion detection systems; GENERTIA;
D O I
10.1016/j.asoc.2006.05.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial immune systems ( AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems ( IDSs). In this paper, we compare a genetic hacker with 12 evolutionary hackers based on particle swarm optimization (PSO) that have been effectively used as vulnerability analyzers ( red teams) for AIS-based IDSs. Our results show that the PSO-based red teams that use Clerc's constriction coefficient outperform those that do not. Our results also show that the three types of red teams ( genetic, basic PSO, and PSO with the constriction coefficient) have distinct search behaviors that are complimentary. (c) 2006 Elsevier B. V. All rights reserved.
引用
收藏
页码:547 / 553
页数:7
相关论文
共 50 条
  • [11] A new immunity-based model for network intrusion detection
    Li, RF
    Wang, C
    Tu, XY
    2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 106 - 109
  • [12] An Immunity-based Error Containment Algorithm for Database Intrusion Response Systems
    Yanes, Nacim
    Mostafa, Ayman M.
    Alshammari, Nasser
    Alanazi, Saad A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (10) : 167 - 178
  • [13] Immunity-based systems: A survey
    Dasgupta, D
    AttohOkine, N
    SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 369 - 374
  • [14] Multi-level immunity-based intrusion detection and risk evaluation model
    Liu, Caiming
    Li, Tao
    Peng, Lingxi
    Zeng, Jinquan
    Zhao, Hui
    Lu, Zhengtian
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2007, 4 (7-8) : 1344 - 1350
  • [15] Immunity-based approaches for self-monitoring in distributed intrusion detection system
    Watanabe, Y
    Ishida, Y
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2003, 2774 : 503 - 510
  • [16] An Improved Immunity-based Trigger for Intrusion Tolerance System
    Huang, Guangqiu
    Wang, Chunzi
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2008, : 279 - 285
  • [18] Detector Optimization Algorithm with Co-Evolution in Immunity-Based Intrusion Detection System
    Xi Liang
    Zhang Fengbin
    PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 620 - 623
  • [19] Optimization of Real-Valued Self Set in Immunity-based WSN Intrusion Detection
    Guo, Weipeng
    Chen, Yonghong
    Wang, Tian
    Tian, Hui
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND ENGINEERING APPLICATIONS, 2016, 63 : 120 - 127
  • [20] Research of immunity-based anomaly intrusion detection and its application for security evaluation of E-government affair systems
    Sun, Feixian
    Guo, Gaiwen
    International Journal of Digital Content Technology and its Applications, 2012, 6 (20) : 429 - 437