An immunity-based technique to characterize intrusions in computer networks

被引:194
作者
Dasgupta, D [1 ]
González, F
机构
[1] Univ Memphis, Dept Math Sci, Div Comp Sci, Memphis, TN 38152 USA
[2] Univ Nacl Colombia, Dept Ingn Sistemas, Bogota, Colombia
基金
美国国家科学基金会;
关键词
artificial immune system; biological systems modeling; detector generation; genetic algorithms; intrusion detection;
D O I
10.1109/TEVC.2002.1011541
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In particular, the novel pattern detectors (in the complement space) are evolved using a genetic search, which could differentiate varying degrees of abnormality in network traffic. The paper demonstrates the usefulness of such a technique to detect a wide variety of intrusive activities on networked computers. We also used a positive characterization method based on a nearest-neighbor classification. Experiments are performed using intrusion detection data sets and tested for validation. Some results are reported along with analysis and concluding remarks.
引用
收藏
页码:281 / 291
页数:11
相关论文
共 29 条
[1]  
[Anonymous], P NEW SEC PAR C GREA
[2]  
[Anonymous], 1994, PIER PAOLO PASOLINI
[3]  
[Anonymous], ACM Trans. Inf. Syst. Secur, DOI DOI 10.1145/322510.322526
[4]   A Sequential Niche Technique for Multimodal Function Optimization [J].
Beasley, David ;
Bull, David R. ;
Martin, Ralph R. .
EVOLUTIONARY COMPUTATION, 1993, 1 (02) :101-125
[5]   MULTIDIMENSIONAL BINARY SEARCH TREES USED FOR ASSOCIATIVE SEARCHING [J].
BENTLEY, JL .
COMMUNICATIONS OF THE ACM, 1975, 18 (09) :509-517
[6]  
Cannady J., 2000, Proceedings of the 23rd national information systems security conference, P1
[7]  
CROSBIE M, 1995, AAAI S GEN PROGR, P1
[8]  
DAGUPTA D, 2001, LECT NOTES COMPUTER, P1
[9]  
DAGUPTA D, 2001, P GEN EV OCMP C GECC
[10]  
DAHESELEER P, 1996, P 1996 IEEE S COMP S, P110