Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers

被引:14
|
作者
Dozier, Gerry [1 ]
Brown, Douglas
Hou, Haiyu
Hurley, John
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
artificial immune systems; intrusion detection systems; GENERTIA;
D O I
10.1016/j.asoc.2006.05.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Artificial immune systems ( AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems ( IDSs). In this paper, we compare a genetic hacker with 12 evolutionary hackers based on particle swarm optimization (PSO) that have been effectively used as vulnerability analyzers ( red teams) for AIS-based IDSs. Our results show that the PSO-based red teams that use Clerc's constriction coefficient outperform those that do not. Our results also show that the three types of red teams ( genetic, basic PSO, and PSO with the constriction coefficient) have distinct search behaviors that are complimentary. (c) 2006 Elsevier B. V. All rights reserved.
引用
收藏
页码:547 / 553
页数:7
相关论文
共 50 条
  • [41] Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems
    Abadeh, M. Saniee
    Habibi, J.
    Daneshi, M.
    Jalali, M.
    Khezrzadeh, M.
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 3547 - 3553
  • [42] Framework of an immunity-based anomaly detection system for user behavior
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 821 - 829
  • [43] Evaluations for immunity-based anomaly detection with dynamic updating of profiles
    Okamoto, Takeshi
    Ishida, Yoshiteru
    ARTIFICIAL LIFE AND ROBOTICS, 2010, 15 (02) : 225 - 228
  • [44] Immunity-based evolutionary algorithm for optimal global container repositioning in liner shipping
    Wong, Eugene Y. C.
    Lau, Henry Y. K.
    Mak, K. L.
    OR SPECTRUM, 2010, 32 (03) : 739 - 763
  • [45] A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization
    Benmessahel, Ilyas
    Xie, Kun
    Chellal, Mouna
    Semong, Thabo
    EVOLUTIONARY INTELLIGENCE, 2019, 12 (02) : 131 - 146
  • [46] A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization
    Ilyas Benmessahel
    Kun Xie
    Mouna Chellal
    Thabo Semong
    Evolutionary Intelligence, 2019, 12 : 131 - 146
  • [47] An immunity-based hybrid genetic algorithms for permutation flowshop scheduling problems
    Malika Bessedik
    Fatima Benbouzid-Si Tayeb
    Hamza Cheurfi
    Ammar Blizak
    The International Journal of Advanced Manufacturing Technology, 2016, 85 : 2459 - 2469
  • [48] Immunity-based evolutionary algorithm for optimal global container repositioning in liner shipping
    Eugene Y. C. Wong
    Henry Y. K. Lau
    K. L. Mak
    OR Spectrum, 2010, 32 : 739 - 763
  • [49] Comparison of immunity-based schemes for aircraft failure detection and identification
    Al Azzawi, Dia
    Moncayo, Hever
    Perhinschi, Mario G.
    Perez, Andres
    Togayev, Adil
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 52 : 181 - 193
  • [50] Anomaly detection system for network security: Immunity-based approach
    Seredynski, F
    Bouvry, P
    Rutkowski, DR
    INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2005, : 486 - 490