Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers

被引:0
|
作者
Dozier, G [1 ]
Brown, D
Hurley, J
Cain, K
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the design of AIS-based IDSs can be improved through the use of evolutionary hackers in the form of GENERTIA red teams (GRTs) to discover holes (in the form of type II errors) found in the immune system. GENERTIA is an interactive tool for the design and analysis of immunity-based intrusion detection systems. Although the research presented in this paper focuses on AIS-based IDSs, the concept of GENERTIA and red teams can be applied to any IDS that uses machine learning techniques to develop models of normal and abnormal network traffic. In this paper we compare a genetic hacker with six evolutionary hackers based on particle swarm optimization (PSO). Our results show that genetic and swarm search are effective and complementary methods for vulnerability analysis. Our results also suggest that red teams based on genetic/PSO hybrids (which we refer to Genetic Swarms) may hold some promise.
引用
收藏
页码:263 / 274
页数:12
相关论文
共 50 条
  • [1] Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers
    Dozier, Gerry
    Brown, Douglas
    Hou, Haiyu
    Hurley, John
    APPLIED SOFT COMPUTING, 2007, 7 (02) : 547 - 553
  • [2] An immunity-based intrusion detection solution for database systems
    Chen, K
    Chen, G
    Dong, JX
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 773 - 778
  • [3] Immunity-based clonal selection algorithm for intrusion detection systems
    Wu, Zejun
    Qian, Lijin
    Liang, Yiwen
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (06):
  • [4] A model of immunity-based network intrusion detection
    Sun, ZX
    Mao, ZX
    Gong, J
    Xu, HX
    Wang, RC
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 417 - 420
  • [5] An immunity-based model for network intrusion detection
    Zhang, YC
    Que, XR
    Wang, WD
    Cheng, SD
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E24 - E29
  • [6] An immunity-based model for dynamic distributed intrusion detection
    Qiao, Peili
    Wang, Tong
    Su, Jie
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973
  • [7] Mutual tests using immunity-based diagnostic mobile agents in distributed intrusion detection systems
    Yuji Watanabe
    Yoshiteru Ishida
    Artificial Life and Robotics, 2004, 8 (2) : 163 - 167
  • [8] Immunity-Based Intrusion Detection for Wireless Sensor Networks
    Liu, Yang
    Yu, Fengqi
    2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 439 - 444
  • [9] An immunity-based dynamic multilayer intrusion detection system
    Liang, Gang
    Li, Tao
    Ni, Jiancheng
    Jiang, Yaping
    Yang, Jin
    Gong, Xun
    COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS, PT 3, PROCEEDINGS, 2006, 4115 : 641 - 650
  • [10] An intelligent immunity-based model for distributed intrusion detection
    Peng, Z. (pengzhihao@neusoft.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (08):