Integrating Innate and Adaptive Immunity for Intrusion Detection

03/05/2010
by   Gianni Tedesco, et al.
0

Network Intrusion Detection Systems (NDIS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS's rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alters, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to an intrusion detection problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

READ FULL TEXT
research
10/16/2009

An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

Network Intrusion Detection Systems (NIDS) are computer systems which mo...
research
03/01/2020

Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection

Network intrusion detection systems and antivirus software are essential...
research
11/02/2018

Alert Correlation Algorithms: A Survey and Taxonomy

Alert correlation is a system which receives alerts from heterogeneous I...
research
05/28/2018

Identification of Flaws in the Design of Signatures for Intrusion Detection Systems

Signature-based Intrusion Detection System (SIDS) provides a promising s...
research
07/13/2023

A Controlled Experiment on the Impact of Intrusion Detection False Alarm Rate on Analyst Performance

Organizations use intrusion detection systems (IDSes) to identify harmfu...
research
09/20/2021

A Novel Online Incremental Learning Intrusion Prevention System

Attack vectors are continuously evolving in order to evade Intrusion Det...
research
07/18/2019

Collecting MIB Data from Network Managed by SNMP using Multi Mobile Agents

Network anomalies are destructive to networks. Intrusion detection syste...

Please sign up or login with your details

Forgot password? Click here to reset