Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers

被引:0
|
作者
Dozier, G [1 ]
Brown, D
Hurley, J
Cain, K
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the design of AIS-based IDSs can be improved through the use of evolutionary hackers in the form of GENERTIA red teams (GRTs) to discover holes (in the form of type II errors) found in the immune system. GENERTIA is an interactive tool for the design and analysis of immunity-based intrusion detection systems. Although the research presented in this paper focuses on AIS-based IDSs, the concept of GENERTIA and red teams can be applied to any IDS that uses machine learning techniques to develop models of normal and abnormal network traffic. In this paper we compare a genetic hacker with six evolutionary hackers based on particle swarm optimization (PSO). Our results show that genetic and swarm search are effective and complementary methods for vulnerability analysis. Our results also suggest that red teams based on genetic/PSO hybrids (which we refer to Genetic Swarms) may hold some promise.
引用
收藏
页码:263 / 274
页数:12
相关论文
共 50 条
  • [31] A new evolutionary neural networks based on intrusion detection systems using multiverse optimization
    Benmessahel, Ilyas
    Xie, Kun
    Chellal, Mouna
    APPLIED INTELLIGENCE, 2018, 48 (08) : 2315 - 2327
  • [32] A new evolutionary neural networks based on intrusion detection systems using multiverse optimization
    Ilyas Benmessahel
    Kun Xie
    Mouna Chellal
    Applied Intelligence, 2018, 48 : 2315 - 2327
  • [33] Immunity-based hybrid evolutionary algorithm for multi-objective optimization
    Wong, Eugene Y. C.
    Yeung, Henry S. C.
    Lau, Henry Y. K.
    RESEARCH AND DEVELOPMENT IN INTELLIGENT SYSTEMS XXV, 2009, : 337 - +
  • [34] Intrusion detection systems vulnerability on adversarial examples
    Warzynski, Arkadiusz
    Kolaczek, Grzegorz
    2018 INNOVATIONS IN INTELLIGENT SYSTEMS AND APPLICATIONS (INISTA), 2018,
  • [35] Artificial Immunity-based Anomaly Detection of Network User Behavior
    Zhang, Yan
    Liu, Caiming
    Qin, Hongying
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 644 - 648
  • [36] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2011, 15 (04) : 215 - 225
  • [37] Dynamic updating of profiles for an immunity-based anomaly detection system
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 456 - +
  • [38] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 123 - 130
  • [39] Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems
    Abadeh, M. Saniee
    Habibi, J.
    Daneshi, M.
    Jalali, M.
    Khezrzadeh, M.
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 3547 - 3553
  • [40] Framework of an immunity-based anomaly detection system for user behavior
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 821 - 829