• DocumentCode
    1663897
  • Title

    Human immune anomaly and misuse based detection for computer system operations: part II

  • Author

    Jucá, Kathia Regina L ; Boukerche, Azzedine ; Sobral, João Bosco M ; Notare, Mirela Sechi M Annoni

  • fYear
    2003
  • Abstract
    This paper is a follow up on our previous work on intrusion detection for computer systems. It is motivated by the accelerated growth of computer viruses in computer networks. Most applications and operational systems are overwhelmed by security failures at different levels. If there are no verification and monitoring procedures in the computational system, then security services (such as access control, firewalls and cryptography) become ineffective. In this paper, we present a security system for fraud detection of intruders and misuse of a mail system in a computer network environment. Our intrusion detection model is inspired by the natural immune system. This paper discusses our model, and presents preliminary results for both anomaly and operational misuse of the computer system.
  • Keywords
    authorisation; computer crime; computer network management; computer network reliability; computer viruses; electronic mail; fraud; anomaly detection; computer networks; computer system operations; computer viruses; fraud detection; intrusion detection; mail system; misuse based detection; natural immune system; security system; Acceleration; Access control; Application software; Computer networks; Computer viruses; Computerized monitoring; Condition monitoring; Humans; Immune system; Intrusion detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Parallel and Distributed Processing Symposium, 2003. Proceedings. International
  • ISSN
    1530-2075
  • Print_ISBN
    0-7695-1926-1
  • Type

    conf

  • DOI
    10.1109/IPDPS.2003.1213279
  • Filename
    1213279