Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers

被引:14
|
作者
Dozier, Gerry [1 ]
Brown, Douglas
Hou, Haiyu
Hurley, John
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
artificial immune systems; intrusion detection systems; GENERTIA;
D O I
10.1016/j.asoc.2006.05.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial immune systems ( AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems ( IDSs). In this paper, we compare a genetic hacker with 12 evolutionary hackers based on particle swarm optimization (PSO) that have been effectively used as vulnerability analyzers ( red teams) for AIS-based IDSs. Our results show that the PSO-based red teams that use Clerc's constriction coefficient outperform those that do not. Our results also show that the three types of red teams ( genetic, basic PSO, and PSO with the constriction coefficient) have distinct search behaviors that are complimentary. (c) 2006 Elsevier B. V. All rights reserved.
引用
收藏
页码:547 / 553
页数:7
相关论文
共 50 条
  • [31] An Immunity-Based Anomaly Detection System with Sensor Agents
    Okamoto, Takeshi
    Ishida, Yoshiteru
    SENSORS, 2009, 9 (11) : 9175 - 9195
  • [32] A dynamic immunity-based model for computer virus detection
    Zhang, Yu
    Li, Tao
    Qin, Renchao
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 500 - 504
  • [33] A new evolutionary neural networks based on intrusion detection systems using multiverse optimization
    Benmessahel, Ilyas
    Xie, Kun
    Chellal, Mouna
    APPLIED INTELLIGENCE, 2018, 48 (08) : 2315 - 2327
  • [34] A new evolutionary neural networks based on intrusion detection systems using multiverse optimization
    Ilyas Benmessahel
    Kun Xie
    Mouna Chellal
    Applied Intelligence, 2018, 48 : 2315 - 2327
  • [35] Immunity-based hybrid evolutionary algorithm for multi-objective optimization
    Wong, Eugene Y. C.
    Yeung, Henry S. C.
    Lau, Henry Y. K.
    RESEARCH AND DEVELOPMENT IN INTELLIGENT SYSTEMS XXV, 2009, : 337 - +
  • [36] Intrusion detection systems vulnerability on adversarial examples
    Warzynski, Arkadiusz
    Kolaczek, Grzegorz
    2018 INNOVATIONS IN INTELLIGENT SYSTEMS AND APPLICATIONS (INISTA), 2018,
  • [37] Artificial Immunity-based Anomaly Detection of Network User Behavior
    Zhang, Yan
    Liu, Caiming
    Qin, Hongying
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 644 - 648
  • [38] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2011, 15 (04) : 215 - 225
  • [39] Dynamic updating of profiles for an immunity-based anomaly detection system
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 456 - +
  • [40] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 123 - 130