DocumentCode :
2634433
Title :
Adaptation techniques for intrusion detection and intrusion response systems
Author :
Ragsdale, Daniel J. ; Carver, Curtis A., Jr. ; Humphries, Jeffrey W. ; Pooch, U.W.
Author_Institution :
Inf. Technol. & Oper. Center, US Mil. Acad., USA
Volume :
4
fYear :
2000
fDate :
2000
Firstpage :
2344
Abstract :
The paper examines techniques for providing adaptation in intrusion detection and intrusion response systems. As attacks on computer systems are becoming increasingly numerous and sophisticated, there is a growing need for intrusion detection and response systems to dynamically adapt to better detect and respond to attacks. The Adaptive Hierarchical Agent-based Intrusion Detection System (AHA! IDS) provides detection adaptation by adjusting the amount of system resources devoted to the task of detecting intrusive activities. This is accomplished by dynamically invoking new combinations of lower level detection agents in response to changing circumstances and by adjusting the confidence associated with these lower-level agents. The Adaptive Agent-based Intrusion Response System (AAIRS) provides response adaptation by weighting those responses that have been successful in the past over those techniques that have not been as successful. As a result, the more successful responses are used more often than the less successful techniques. It also adapts responses based on the system´s belief that intrusion detection reports are valid. Intuitively, adaptive detection and response systems will provide more robust protection than static, non-adaptive systems
Keywords :
adaptive systems; computer crime; software agents; Adaptive Agent-based Intrusion Response System; Adaptive Hierarchical Agent-based Intrusion Detection System; adaptation techniques; computer system attacks; confidence; intrusion detection systems; intrusion response systems; lower level detection agents; protection; Automatic control; Computer crime; Computer science; Computer security; Information technology; Intrusion detection; Military computing; Protection; Prototypes; Robustness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Man, and Cybernetics, 2000 IEEE International Conference on
Conference_Location :
Nashville, TN
ISSN :
1062-922X
Print_ISBN :
0-7803-6583-6
Type :
conf
DOI :
10.1109/ICSMC.2000.884341
Filename :
884341
Link To Document :
بازگشت