Further Analysis of an Off-Line Intrusion Detection System: An Expanded Case Study in Multi-Objective Genetic Algorithms
نویسندگان
چکیده
One computer security mechanism used currently is the Intrusion Detection System (IDS). Off-line IDSs search audit trail registries looking for user activities that match patterns of events known as attacks. Because such search is NP-complete, heuristic methods will need to be employed as databases of events and attacks grow. Genetic Algorithms (GAs) have been widely used as heuristic search methods. However, balancing the need to detect all possible attacks in an audit trail with the need to avoid warnings of attacks that do not exist is a challenge, given the scalar fitness values required by GAs. We present an expanded case study of GASSATA—a Genetic Algorithm as an Alternative Tool for Security Audit Trail Analysis (Mé, 1998), a previously proposed GA-based IDS that shows this difficulty with respect to its fitness function. Previously we proposed a new method to overcome it. Here we compare our method to an alternative of using a different selection mechanism. GASSATA is an off-line IDS (Mé, 1998) with fitness function F (I) = α+ ∑Na i=1Wi · Ii − β ∗ T , where I is the hypothesis vector, α maintains F (I) > 0 in order to retain diversity in the population (using proportional probability selection),Na is the number of known attacks,W is the weighted vector that reflects the risk of each attack, β provides a slope for the penalty function, and T is the number of times for which (AE ·I)i > OVi, where AE is the attack-event matrix that shows which events are required for each attack, and OV is the observed vector of events. Mé (1998) reports good results with GASSATA but our experience has been that the system often generates false positives and negatives (Diaz-Gomez & Hougen, 2005). For this reason, based on experimental results we proposed a new fitness function: F (I) = Ne − T ′, where Ne corresponds to the number of events, and T ′ corresponds to the number of times that (AE · I)i > OVi, for each attack Ii. That is, if a hypothesized attack Ii considered alone, would cause (AE · I)i > OVi for some i, and another hypothesized attack Ij considered alone, would also cause (AE · I)i > OVi, then T ′ would have a value of 2 (whereas T would have a value of 1). Now, the better the hypothesized vector I , the smaller T ′ is, and of course, F (I) → Ne, the maximum. To avoid false negatives, we added a mechanism that takes the union of all newly hypothesized attacks that are consistent with the existing aggregate solution set. The results found with the new fitness function and mechanism are that there are no false positives and that the number of false negatives decreases dramatically compared to the results we saw previously (Diaz-Gomez & Hougen, 2005). This time 70 runs were performed—10 repetitions each for 7 different cases—and only one time a false negative was present. Here we repeat this experiment in order to compare proportional probability with tournament selection, and we obtain similar results: false positives and false negatives with GASSATA’s fitness function; no false negatives or false positives with the fitness function and mechanism we suggested in order to solve this problem. This research shows some difficulties in providing accurate values to parameters in the fitness function suggested in GASSATA (Mé, 1998) and proposes a solution independent of variable parameters making the fitness function to solve this particular problem quite general and independent of the audit trail data. Our solution has proved more effective than both the original and a variant of the original using tournament selection.
منابع مشابه
A Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders
Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملAn Ensemble Approach to Intrusion Detection Based on Improved Multi-objective Genetic Algorithm
There exist some issues in current intrusion detection algorithms such as unbalanced detection performance on different types of attacks, and redundant or useless features that will lead to the complexity of detection model and degradation of detection accuracy. This paper presents an ensemble approach to intrusion detection based on improved multi-objective genetic algorithm. The algorithm gen...
متن کاملA Hybrid Framework for Building an Efficient Incremental Intrusion Detection System
In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...
متن کاملImproved Off-Line Intrusion Detection Using a Genetic Algorithm
One of the primary approaches to the increasingly important problem of computer security is the Intrusion Detection System. Various architectures and approaches have been proposed including: Statistical, rule-based approaches; Neural Networks; Immune Systems; Genetic Algorithms; and Genetic Programming. This paper focuses on the development of an off-line Intrusion Detection System to analyze a...
متن کاملDesigning an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic
One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005