DocumentCode
1663897
Title
Human immune anomaly and misuse based detection for computer system operations: part II
Author
Jucá, Kathia Regina L ; Boukerche, Azzedine ; Sobral, João Bosco M ; Notare, Mirela Sechi M Annoni
fYear
2003
Abstract
This paper is a follow up on our previous work on intrusion detection for computer systems. It is motivated by the accelerated growth of computer viruses in computer networks. Most applications and operational systems are overwhelmed by security failures at different levels. If there are no verification and monitoring procedures in the computational system, then security services (such as access control, firewalls and cryptography) become ineffective. In this paper, we present a security system for fraud detection of intruders and misuse of a mail system in a computer network environment. Our intrusion detection model is inspired by the natural immune system. This paper discusses our model, and presents preliminary results for both anomaly and operational misuse of the computer system.
Keywords
authorisation; computer crime; computer network management; computer network reliability; computer viruses; electronic mail; fraud; anomaly detection; computer networks; computer system operations; computer viruses; fraud detection; intrusion detection; mail system; misuse based detection; natural immune system; security system; Acceleration; Access control; Application software; Computer networks; Computer viruses; Computerized monitoring; Condition monitoring; Humans; Immune system; Intrusion detection;
fLanguage
English
Publisher
ieee
Conference_Titel
Parallel and Distributed Processing Symposium, 2003. Proceedings. International
ISSN
1530-2075
Print_ISBN
0-7695-1926-1
Type
conf
DOI
10.1109/IPDPS.2003.1213279
Filename
1213279
Link To Document