Tunable Immune Detectors for Behaviour-Based Network Intrusion Detection

نویسندگان

  • Mário Antunes
  • Manuel Eduardo Correia
چکیده

Computer networks are highly dynamic environments in which the meaning of normal and anomalous behaviours can drift considerably throughout time. Behaviour-based Network Intrusion Detection System (NIDS) have thus to cope with the temporal normality drift intrinsic on computer networks, by tuning adaptively its level of response, in order to be able to distinguish harmful from harmless network traffic flows. In this paper we put forward the intrinsic Tunable Activation Threshold (TAT) theory ability to adaptively tolerate normal drifting network traffic flows. This is embodied on the TAT-NIDS, a TAT-based Artificial Immune System (AIS) we have developed for network intrusion detection. We describe the generic AIS framework we have developed to assemble TAT-NIDS and present the results obtained thus far on processing real network traffic data sets. We also compare the performance obtained by TAT-NIDS with the well known and widely deployed signature-based snort network intrusion detection system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

Intrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors

In this article the artificial immune system and neural network techniques for intrusion detection have been addressed. The AIS allows detecting unknown samples of computer attacks. The integration of AIS and neural networks as detectors permits to increase performance of the system security. The detector structure is based on the integration of the different neural networks namely RNN and MLP....

متن کامل

Towards an Immune-inspired Temporal Anomaly Detection Algorithm based on Tunable Activation Thresholds

The detection of anomalies in computer environments, like network intrusion detection, computer virus or spam classification, are usually based on some form of pattern search on a database of pre-computed “signatures” for known anomalies. Although very successful and widely deployed, these approaches are only able to cope with anomalous events that have already been seen and classified or, with...

متن کامل

An Immunological Model of Distributed Detection and Its Application to Computer Security

This dissertation explores an immunological model of distributed detection, called negative detection, and studies its performance in the domain of intrusion detection on computer networks. The goal of the detection system is to distinguish between illegitimate behaviour (nonself ), and legitimate behaviour (self ). The detection system consists of sets of negative detectors that detect instanc...

متن کامل

An immune based model for dynamic intrusion detection

A new immune based model called AIBM for dynamic intrusion detection is proposed. AIBM uses a very small dynamic self set during the self tolerance for immature detectors, resulting in a higher efficiency in generating new mature detectors than traditional computer immune systems (CIS). Meanwhile, the self set can synchronize their variations with the real-network environment as time goes on, r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011