Tunable Immune Detectors for Behaviour-Based Network Intrusion Detection
نویسندگان
چکیده
Computer networks are highly dynamic environments in which the meaning of normal and anomalous behaviours can drift considerably throughout time. Behaviour-based Network Intrusion Detection System (NIDS) have thus to cope with the temporal normality drift intrinsic on computer networks, by tuning adaptively its level of response, in order to be able to distinguish harmful from harmless network traffic flows. In this paper we put forward the intrinsic Tunable Activation Threshold (TAT) theory ability to adaptively tolerate normal drifting network traffic flows. This is embodied on the TAT-NIDS, a TAT-based Artificial Immune System (AIS) we have developed for network intrusion detection. We describe the generic AIS framework we have developed to assemble TAT-NIDS and present the results obtained thus far on processing real network traffic data sets. We also compare the performance obtained by TAT-NIDS with the well known and widely deployed signature-based snort network intrusion detection system.
منابع مشابه
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملIntrusion Detection in TCP/IP Networks Using Immune Systems Paradigm and Neural Network Detectors
In this article the artificial immune system and neural network techniques for intrusion detection have been addressed. The AIS allows detecting unknown samples of computer attacks. The integration of AIS and neural networks as detectors permits to increase performance of the system security. The detector structure is based on the integration of the different neural networks namely RNN and MLP....
متن کاملTowards an Immune-inspired Temporal Anomaly Detection Algorithm based on Tunable Activation Thresholds
The detection of anomalies in computer environments, like network intrusion detection, computer virus or spam classification, are usually based on some form of pattern search on a database of pre-computed “signatures” for known anomalies. Although very successful and widely deployed, these approaches are only able to cope with anomalous events that have already been seen and classified or, with...
متن کاملAn Immunological Model of Distributed Detection and Its Application to Computer Security
This dissertation explores an immunological model of distributed detection, called negative detection, and studies its performance in the domain of intrusion detection on computer networks. The goal of the detection system is to distinguish between illegitimate behaviour (nonself ), and legitimate behaviour (self ). The detection system consists of sets of negative detectors that detect instanc...
متن کاملAn immune based model for dynamic intrusion detection
A new immune based model called AIBM for dynamic intrusion detection is proposed. AIBM uses a very small dynamic self set during the self tolerance for immature detectors, resulting in a higher efficiency in generating new mature detectors than traditional computer immune systems (CIS). Meanwhile, the self set can synchronize their variations with the real-network environment as time goes on, r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011