Vulnerability analysis of immunity-based intrusion detection systems using evolutionary hackers

被引:0
|
作者
Dozier, G [1 ]
Brown, D
Hurley, J
Cain, K
机构
[1] Auburn Univ, Dept Comp Sci & Software Engn, Auburn, AL 36849 USA
[2] Clark Atlanta Univ, Dept Comp Sci, Atlanta, GA 30314 USA
[3] Boeing Co, Distributed Syst Integrat, Seattle, WA 98124 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the design of AIS-based IDSs can be improved through the use of evolutionary hackers in the form of GENERTIA red teams (GRTs) to discover holes (in the form of type II errors) found in the immune system. GENERTIA is an interactive tool for the design and analysis of immunity-based intrusion detection systems. Although the research presented in this paper focuses on AIS-based IDSs, the concept of GENERTIA and red teams can be applied to any IDS that uses machine learning techniques to develop models of normal and abnormal network traffic. In this paper we compare a genetic hacker with six evolutionary hackers based on particle swarm optimization (PSO). Our results show that genetic and swarm search are effective and complementary methods for vulnerability analysis. Our results also suggest that red teams based on genetic/PSO hybrids (which we refer to Genetic Swarms) may hold some promise.
引用
收藏
页码:263 / 274
页数:12
相关论文
共 50 条
  • [41] Evaluations for immunity-based anomaly detection with dynamic updating of profiles
    Okamoto, Takeshi
    Ishida, Yoshiteru
    ARTIFICIAL LIFE AND ROBOTICS, 2010, 15 (02) : 225 - 228
  • [42] Immunity-based evolutionary algorithm for optimal global container repositioning in liner shipping
    Wong, Eugene Y. C.
    Lau, Henry Y. K.
    Mak, K. L.
    OR SPECTRUM, 2010, 32 (03) : 739 - 763
  • [43] A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization
    Benmessahel, Ilyas
    Xie, Kun
    Chellal, Mouna
    Semong, Thabo
    EVOLUTIONARY INTELLIGENCE, 2019, 12 (02) : 131 - 146
  • [44] A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization
    Ilyas Benmessahel
    Kun Xie
    Mouna Chellal
    Thabo Semong
    Evolutionary Intelligence, 2019, 12 : 131 - 146
  • [45] Immunity-based evolutionary algorithm for optimal global container repositioning in liner shipping
    Eugene Y. C. Wong
    Henry Y. K. Lau
    K. L. Mak
    OR Spectrum, 2010, 32 : 739 - 763
  • [46] Comparison of immunity-based schemes for aircraft failure detection and identification
    Al Azzawi, Dia
    Moncayo, Hever
    Perhinschi, Mario G.
    Perez, Andres
    Togayev, Adil
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 52 : 181 - 193
  • [47] Anomaly detection system for network security: Immunity-based approach
    Seredynski, F
    Bouvry, P
    Rutkowski, DR
    INTELLIGENT INFORMATION PROCESSING AND WEB MINING, PROCEEDINGS, 2005, : 486 - 490
  • [48] Features Selection Approaches for Intrusion Detection Systems based on Evolutionary Algorithms
    Zaman, Safaa
    El-Abd, Mohammed
    Karray, Falchri
    2009 3RD INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS (SCS 2009), 2009, : 155 - 160
  • [49] Intrusion detection with evolutionary learning classifier systems
    Shafi K.
    Kovacs T.
    Abbass H.A.
    Zhu W.
    Natural Computing, 2009, 8 (1) : 3 - 27
  • [50] Using vulnerability analysis to model attack scenario for collaborative intrusion detection
    Liu, Xuejiao
    Xiao, Debao
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1273 - 1277