Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion ( Extended
نویسندگان
چکیده
Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying existing attacks. With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities. Current antivirus and network intrusion detection solutions can become overwhelmed by the burden of capturing and classifying new viral stains and intrusion patterns. To overcome this problem, a self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture using genetic algorithms. A prototype interactive system is designed, implemented in Java, and tested. The results validate the use of a distributed-agent biologicalsystem approach toward the computer-security problems of virus elimination and intrusion detection. Also, a intrusion detection variation using evolutionary programming is introduced. This generic research is sponsored by the Defensive Information Warfare Branch, Information Directorate, Air Force Research Laboratory, Rome, NY. In its purest form, intrusion detection (ID) is the process of identifying the presence of unauthorized access to an enterprises computing resources. In practice, ID is broader and includes the detection of: 1) misuse/abuse; unauthorized activities by authorized users (e.g., accessing pornography, theft of information, using corporate resources for personal gain); 2) reconnaissance; determination of systems and services that may be exploitable; 3) penetration; attempt of unauthorized activity to gain access to computing resources; 4) penetration; successful access to computing resources by unauthorized users; 5) trojanization; presence and activity of unauthorized processes; 6) denial of service; an attack that obstructs legitimate access to computing resources.
منابع مشابه
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملExtending the Computer Defense Immune System: Network Intrusion Detection with a Multiobjective Evolutionary Programming Approach
Attacks against computer networks are becoming more sophisticated, with adversaries using new attacks or modifying existing attacks. The research uses two types of multiobjective approaches, lexicographic and Pareto-based, in an evolutionary programming algorithm to develop a new method for detecting such attacks. This development extends the Computer Defense Immune System, an artificial immune...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملIntrusion detection using a fuzzy genetics-based learning algorithm
Fuzzy systems have demonstrated their ability to solve different kinds of problems in various applications domains. Currently, there is an increasing interest to augment fuzzy systems with learning and adaptation capabilities. Two of the most successful approaches to hybridize fuzzy systems with learning and adaptation methods have been made in the realm of soft computing. Neural fuzzy systems ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004