DocumentCode :
3395287
Title :
Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams
Author :
Dozier, Gerry ; Brown, Douglas ; Hurley, John ; Cain, Krystal
Author_Institution :
Dept. of Comput. Sci. & Software Eng., Auburn Univ., AL, USA
Volume :
1
fYear :
2004
fDate :
19-23 June 2004
Firstpage :
111
Abstract :
Artificial immune systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). In this paper we compare a genetic hacker with 12 evolutionary hackers based on particle swarm optimization (PSO) that have been effectively used as vulnerability analyzers (red teams) for AIS-based IDSs. Our results show that the PSO-based red teams that use Clerc´s constriction coefficient outperform those that do not. Our results also show that the three types of red teams (genetic, basic PSO, and PSO with the constriction coefficient) have distinct search behaviors that are complimentary. This result suggests that red teams based on genetic swarms may hold the most promise.
Keywords :
artificial life; computer crime; genetic algorithms; AIS-based intrusion detection systems; IDS; PSO; artificial immune system; constriction coefficient; evolutionary hackers; genetic hacker; genetic swarms; particle swarm optimization; vulnerability analysis; Artificial immune systems; Computer hacking; Computer science; Detectors; Genetics; Intrusion detection; Particle swarm optimization; Software; Statistical analysis; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Evolutionary Computation, 2004. CEC2004. Congress on
Print_ISBN :
0-7803-8515-2
Type :
conf
DOI :
10.1109/CEC.2004.1330845
Filename :
1330845
Link To Document :
بازگشت