Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers

被引:14
|
作者
Dozier, Gerry [1 ]
Brown, Douglas
Hou, Haiyu
Hurley, John
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
artificial immune systems; intrusion detection systems; GENERTIA;
D O I
10.1016/j.asoc.2006.05.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial immune systems ( AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems ( IDSs). In this paper, we compare a genetic hacker with 12 evolutionary hackers based on particle swarm optimization (PSO) that have been effectively used as vulnerability analyzers ( red teams) for AIS-based IDSs. Our results show that the PSO-based red teams that use Clerc's constriction coefficient outperform those that do not. Our results also show that the three types of red teams ( genetic, basic PSO, and PSO with the constriction coefficient) have distinct search behaviors that are complimentary. (c) 2006 Elsevier B. V. All rights reserved.
引用
收藏
页码:547 / 553
页数:7
相关论文
共 50 条
  • [21] A Novel Immunity-Based Anomaly Detection Method
    Zeng, Jie
    Zeng, Jinquan
    FBIE: 2008 INTERNATIONAL SEMINAR ON FUTURE BIOMEDICAL INFORMATION ENGINEERING, PROCEEDINGS, 2008, : 195 - +
  • [22] IMMUNITY-BASED DETECTION OF CYBERATTACKS ON MQTT BROKERS
    Okamoto, Takeshi
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2024, 20 (02): : 617 - 634
  • [23] Immunity-Based Model for Malicious Code Detection
    Zhang, Yu
    Wu, Lihua
    Xia, Feng
    Liu, Xiaowen
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, 2010, 6215 : 399 - 406
  • [24] Artificial immunity-based spam detection system
    Sirisanyalak, B.
    Sornil, O.
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 3392 - 3398
  • [25] Anomaly intrusion detection systems based on evolutionary computing
    Srinoy, Surat
    Chimphlee, Siriporn
    Chimphlee, Witcha
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 166 - +
  • [26] Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm AA red teams
    Dozier, G
    Brown, D
    Hurley, J
    Cain, K
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 111 - 116
  • [27] Immunity-Based Evolutionary Interpretation of Diet-Induced Thermogenesis
    Liao, Wan-Hui
    Henneberg, Maciej
    Langhans, Wolfgang
    CELL METABOLISM, 2016, 23 (06) : 971 - 979
  • [28] Immunity-based genetic algorithm for classification rule discovery
    Wang, ZQ
    Zhang, DX
    ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 727 - 734
  • [29] A dynamic immunity-based model for computer virus detection
    Zhang, Yu
    Li, Tao
    Qin, Renchao
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 515 - 519
  • [30] Artificial immunity-based feature extraction for spam detection
    Sirisanyalak, Burim
    Sornil, Ohm
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 359 - +